Font Size: a A A

Design And Implementation Of Chongqing Electric Power Information Intranet Security Accesscontrol System

Posted on:2016-05-11Degree:MasterType:Thesis
Country:ChinaCandidate:X Y XuFull Text:PDF
GTID:2308330473456643Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of network technology, frequent cyber attacks, data leakage, insufficient flow and other phenomena continue to occur, which greatly harm to enterprises of all kinds of information security, most of them one by one to exploit system vulnerabilities to attack, and after a successful attack into the a lot of harm procedures for infection and propagation, leading to lack of reasonable corporate data security, the use of illegal software programs and take up more bandwidth traffic procedures are likely to affect other employees in their daily work, in simple tasks approval procedures, lack of rapid response and handling, resulting in low productivity throughout the enterprise. Traditional solution is to use a firewall to block demarcation of the border value method of attack for server applications, the client is mainly used to stop anti-virus software, but with the rapid development of existing hacking techniques, the original solution can not meet the modern network security management needs.Chongqing Electric Power within the information network security management and control system is built up in this context, this paper from the research background and analysis of research from the hair within the meaning network security management and construction goals, and put forward the main contents of this paper; followed by the system requirements analysis, analysis of the functional requirements and non-functional requirements of the system; followed by detailed design content according to system requirements, mainly from the system architecture of the system, terminal configuration, each functional module and database design a lot work to lay the foundation for the realization of the system; then complete the implementation of the system, mainly from the idea of the system implementation process, interface design, and business processes carried out each function module; and finally the complete testing of the system work, but also test whether the system in accordance with functional realization of needs, mainly from the various aspects of the system testing purposes, the environment, test content, test summary carried out a detailed test of the system is guaranteed quality.The system will use the latest JAVA technology, database design, B / S architecture to build complete systems technology architecture, the system can provide unified security building access control. Access management systems with the desktop control systems, antivirus and other security software, a unified security policy configuration in order to prevent the occurrence of illegal outreach and other malicious security events, thus avoiding Chongqing power base caused by the decline assessment indicators, to enhance endpoint security, engage in high-level business services and management level.
Keywords/Search Tags:Network security, firewalls, endpoint security, JAVA technology, illegal outreach
PDF Full Text Request
Related items