Font Size: a A A

The Design And Implementation Term Inal Security Check System Terminal Info Rmation And Traffic Monitoring

Posted on:2016-01-18Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2308330482453260Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the rapid development of computer and network technology, the computer science has been and will profoundly change the way of people live, production and management, plays a very important role in the promoting the social development and modern civilization. The information security problems faced some great challenges in the whole informatization processing. Information security issues related to the national security, public safety and other aspects. It must solve the problem of information security to achieve the healthy development of the whole society’s informatization and modernization. With the informatization deepening development of government and enterprises, automation, the automately and networkly office is very common. Meanwhile, the computer terminal, as core of the office, carried a large amount of iner-security information. Owing to the complexity and commonly of the attacks to computer terminal, the rish of the office computer terminal being theft and leak security information is growing. Therefore, it must be take some measures to protect the computer terminal.In this paper, based on computer terminal security check system project for Chinese Academy of Sciences, we conduct a study on the security problems of office environment computer, after which we design and implement a terminal security check system for Chinese Academy of Sciences. Using C# programming language, client software provides nine functional modules as follows, terminal security configuration management, patch management, terminal state collection, hardware information query, installed software management, computer optimization and acceleration, process traffic monitor, running service control and anti-virus scan. Computer terminal security check system for the CAS provides integrated security management system, checking and repairing the terminals’ security configuration, effectively reducing the terminals safety operation maintenance, improving management efficiency, ensuring the safe and stable operation of computer terminals.The paper does the research on the hardware information query, installation of software management and flow monitoring of software. I analyze domestic and foreign computer security terminals and introduce the technical difficulties and main contents in the paper.Firstly, the paper introduces the theoretical background knowledge, the registry’s profile and its’ roles in the whole system. It also introduces the WMI, architecture and CIM repository. Finally, it introduces the seven-layer model and basic knowledge of Socket.Secondly, hardware information query and install software management mainly used the role for WMI and registry in Windows. How to use WMI and the structure of the registry in the.NET platform? The registry files’ difference and use in a 32-bit system and a 64-bit system. After getting the corresponding data, it remains important in the synchronize data with the server.Finally, the process flow monitoring is effective monitoring of the user’s network traffic in the process of using a computer with internet access, easy to view traffic information on your own computer. It introduced the low-level operating modes Socket communication port and the mappings between ports and processes, how to build Socket instance and analyze data packets.
Keywords/Search Tags:WMI, Network traffic, Terminal Information, Terminal security
PDF Full Text Request
Related items