Font Size: a A A

The Design And Implementation Of Information Security Level Protection Management Subsystem

Posted on:2016-02-14Degree:MasterType:Thesis
Country:ChinaCandidate:D X WangFull Text:PDF
GTID:2348330503469558Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of science and technology and wide application of information technology, the Internet has become a new platform for information sharing and development. Information system as the carrier of information has been infiltrated into various fields. It has brought great convenience for people to study and solve the problem. In order to protect the system information security, we need to protect the system's storage, transmission and processing of data, information security level protection comprehensive management system for information system security construction and management to provide systematic, targeted, feasibility of the guidance and services, system can register and determine the system level, then the system for the record, safety construction, safety inspection, risk assessment, safety assessment, so as to improve the overall level of information system, and ensure the safe operation of the information system.This project comes from the Lubrizol company undertakes classified protection of information security management platform project. The system is divided into several parts, including grade protection work management, daily office management, data statistics and analysis and system management. This paper mainly completes the design and implementation of information security level protection work management subsystem. The system is based on the information security level protection work, the classification and record, safety construction, safety inspection, risk assessment, safety evaluation, and other work links, including information and data collection, workflow management and so on. In the analysis of the needs of the project, through the analysis of the business process, the data flow chart is drawn, and the detailed use case analysis of the system is given. In the system analysis and design stage, the system function model is built, and the system control class is refined by using the method of system model. The system can be maintained and scalable, the system can be classified and recorded. In the database design, the system E-R diagram is given by analyzing the system entity set and the relation set. Through the MVC framework, the data structure and business model are separated, which makes the system easy to develop and expand. Finally, Eclipse+Tomcat+My SQL platform is used to implement the functional modules, and through the functional testing and performance testing, to meet the functional requirements and performance requirements of the system.
Keywords/Search Tags:Information security, Information system, Assessment Methods of Hierarchy
PDF Full Text Request
Related items