Font Size: a A A

The Design And Implementation Of The Key Field Of Network And Information Security Check

Posted on:2016-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:X D XiaoFull Text:PDF
GTID:2308330461488891Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As the global level of information continues to improve as well as the security ris k has been expanded, security of information systems has become the centre of world’ s attention and one of the most urgent problem. At the same time, information security check is also emerged. However, the present situation is that China’s information sec urity check is behind the United States, Japan and other information developed countri es. Information security check was time-consuming in the past. To cope with this, we have gone through a detailed research including analysis, software architecture design and code, and ultimately developed the key areas of network and information security inspection platform.This paper analyzes the background of this new system and the domestic as well as abroad background of the work in inspecting information safety. This essay also su ms up contents of interviews to the higher authorities, potential users during the resear ch period and summarize the basic flow of information security inspection work comb ining the successful experience of grade protecting and evaluating work. Finally the pr ocess of completing the development of the platform will be illustrated as well.The way of manual checking currently adopted manually checked, which is very t ime-consuming and labor-intensive,is likely to fail to reach the ultimate goal of the ins pection.Before Information Security checks were carried out,self-examination with provi ncial departments are required to conduct. However,lack of professional guidance oft en leads to serious security incident,leaving people repentant;When competent authorities (Economic and Information Technology Commissio n)make the statistics of security situation in all sectors, the aggregation of data is requi red. Departments need to report itself, then artificial statistical analysis will be conduc ted. This is prone to get wrong data,which is not conducive to Provincial Commission to know better about network security situation in our province and make overall plan ning guidance;There isn’t much communication between various provincial departments around the city,so one city do not know much about the network conditions of its neighbor. C lear understanding is lacked towards status and trends of network security;When problems arise, rectification is needed within the information system, incl uding the analysis of security of demand, technical analysis program, the overall syst em design and planning and so on. However,it would be counterproductive if such rec tification is carried out without proper professional guidance.
Keywords/Search Tags:key field, Information security check, Level protection, Virtualization
PDF Full Text Request
Related items