Font Size: a A A

Design And Implementation Of Enterprise Information And Data Leakage Prevention Systems

Posted on:2015-02-01Degree:MasterType:Thesis
Country:ChinaCandidate:F WangFull Text:PDF
GTID:2308330473453490Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development and wide application of information technology, information systems poses a severe challenge for enterprise information security, while bring high efficiency for the enterprise, especially for enterprise data leakage.In order to effectively solve the problem of enterprise data security, this thesis designs and implements a enterprise data leakage prevention systems.This thesis provides a more complete scheme for data leakage prevention systems,which based on detailed research and analysis,including the system structure design, the function of each module design, database design and system integration and deployment etc. Further,it gives the detailed design for the terminal data security, the data protection security management, the network data security detection,the data security analysis and detection and the system integration management module.In terms of technology, the system developed by the Eclipse and SQL Server2005, and deployed on Weblogic10.2. Full encryption and access control on enterprise information systems and user terminals data is realized in this systems, especially for the storage, transmission and usege of the secret information.which also provided the operation log and audit functions of the documents.By the test results show that the enterprise information and data leakage prevention systems in this thesis can bring the management improvement in data controllability for the enterprise data security management,and prevent unauthorized access and theft of the confidential information,reduce the loss of sensitive data leakage for the enterprise,greatly improve the efficiency of the processing and management of enterprise sensitive data.
Keywords/Search Tags:information security, encryption and decryption technology, J2EE
PDF Full Text Request
Related items