Font Size: a A A

Analysis And Research Of E-government Network Security Isolation And Data Exchange Technology

Posted on:2017-04-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y J WangFull Text:PDF
GTID:2348330503474914Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, network security issues have become the core issue that people increasingly pay attention to. In the process of vigorously promoting the development of e-government, on the one hand, e-government involves different levels of classified information, which need security isolation. On the other hand, part of the internal network information in Electronic Government affair need to be exchanged with the external network in real time. The contradiction between the two aspects of demand promotes us to find a new solution to ensure the security isolation and efficient exchange between the internal and external network information of e-government.Firstly, the research background and research status at home and abroad based on network isolation technology is briefly described in this paper. And the related concept of e-government and network structure is introduced. The existing security problems, network isolation technology are analyzed. Secondly, the advantages and disadvantages of the existing isolation switching technology are analyzed from the E-government Cross/ longitudinal, and puts forward that we should also strengthen the management of security in addition to ensuring the safety of these technologies. And the necessary laws and regulations are the key to ensure the security of e-government system. At last, the key technologies and main equipment of the network isolation and data exchange of e-government are deeply studied.Based on the above research, through the analysis and comparison of the current various network isolation technology and program at home and abroad, a data exchange model that used for medium or small scale E- government network is proposed in order to effectively implement the isolation and exchange of data, in view of the characteristics and deficiencies in the implementation of information security,and the security of the model is analyzed. At last, according to the current situation of a city's e-government network, a complete network isolation and data exchange scheme is proposed for the city. And part of the logic isolation technologies are configured and functional examination.
Keywords/Search Tags:Electronic government network, network security isolation, data exchange
PDF Full Text Request
Related items