Font Size: a A A

The Design And Implementation Of Security And Privacy Management Information System Of Classified Personnel And Carriers

Posted on:2015-03-22Degree:MasterType:Thesis
Country:ChinaCandidate:J Y LiuFull Text:PDF
GTID:2298330467453652Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the improvement of China’s comprehensive national strength and national defensestatus, domestic and foreign hostile forces and foreign intelligence agencies to increase theintensity of my military units of theft, privacy and anti-theft has become the core points. Inthe current tough environment, China’s national defense science and technologyconfidentiality enormous challenge, a detailed analysis of the following: a weak part of themilitary enterprise security management, security awareness weak; lack of knowledge ofconfidential technology, information security management in place; China’s national defensescience and technology network security work is not precise enough, not enough attention toconfidentiality. The topic for our military units and defense industry to carry out securitywork carried out in secret work, internal classified assets, management of information is abasic work, but also the easiest part of loopholes appear, the subject of today’s advanced andmature use of RFID systems and database, alarms, video capture in the consolidated classifiedasset identification system integrated control of key positions in circulation and classifiedpersonnel carriers to monitor and achieve dense source of information flow control, tosupplement the existing system deficiencies confidential information to help perfect jobsecurity management mechanism to prevent theft and the greatest degree of loss of defenseand aerospace confidential information.The system on the user access using B/S mode, the system uses RFID technology intoday’s mature domestic and domestic database systems, set UHF RFID, I/O control, videomonitoring and control, application software, intelligent judgment, communicationtechnology, safety technology in one, all of the pages and functional design andimplementation. The core of this issue is through a comprehensive and systematic analysis ofthe needs of the system construction, for the overall design in design idea, businessarchitecture, technical framework, safety system, as well as system module structure. Theimportant and difficult issue is the use of flow charts, class diagrams, renderings and othermajor subsystem functions were designed in detail.On the basis of this study to establish a database system, using graphical management platform for basic personnel information, job information, dense information, the informationcarried by the carrier, check authorization status retrieval, identification and monitoring offront-end systems set up at key locations, through work together and each subunit interactionwith the database, to achieve the carrier and personnel flow monitoring, timely detection ofirregularities and illegal access, illegal carrying out to ensure that classified information is notcompromised and lost. Data provided by the system, the work of the security department canprovide reliable reference data to help managers find the weak areas of security, provide thebasis for strengthening security work.
Keywords/Search Tags:confidential, monitor, security management
PDF Full Text Request
Related items