Font Size: a A A

Design And Implementation Of Information Security Control System Based On NP Architecture

Posted on:2015-01-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y X GaoFull Text:PDF
GTID:2308330473451616Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In government and big enterprises, people always use internet to send all kinds of files, while the normal files passing through the internet, some important files could also leak out through internet. It is very urgent to set up a reliable information control system between internal nets and external nets in order to control the file from internal nets to external nets properly, so that we can avoid the leaking of the important files and information. Therefore, it is necessary to build the “Important information widespread control system” to solve this problem.To reach the requirements, which have been mentioned above, we can separate the digital files according to the rules we have made in advance, into three levels, “free to go”, “limited widespread” and “internal nets only”. Suspicious information widespread will be forced to stop. This will guarantee the security of the control of the important information.In this paper, “important information widespread control system” based on the Network Processor structure is suggested to assure the continuity of the after-development of the system and fit the large scale internal nets. The system will be integrated on the hardware and connected between the interfaces of the internal nets and external nets. It will bring into effect through 5 main modules, comprehensive control, and data capture, and data processing, rules of control and user management. Also these modules will test the function and performance of the system.In this paper, the requirement of the documents delivery in government and enterprises is analyzed, the NP technology is introduced. Also the important information widespread control system, which is based on the NP structure, is designed. The NP structure is easy to control and is flexible enough to make this system into reality, which finally take the control of the documents delivery between internal nets and external nets.
Keywords/Search Tags:Network processor, information security, information control
PDF Full Text Request
Related items