Font Size: a A A

Design And Implementation Of Classified Information Checking System Of Windows Hosts In The Local Area Network

Posted on:2016-03-04Degree:MasterType:Thesis
Country:ChinaCandidate:D D GuanFull Text:PDF
GTID:2348330512974935Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Development of networks and information technology,to make our work easier,while avoiding information leakage is more important.In some organizations,the network is divided into classified and non-classified LAN,but due to some lack of safety awareness of employees,confidential documents saved in handy no mandatory physical isolation of non-classified network.Because of the Internet connection and there is the possibility of leaking classified information,and therefore non-classified network management is extremely important to the development of an efficient security check system is necessary.This article describes the development background check system Confidential Information,and functional requirements of the system were necessary analysis,detailing some of the problems to be solved in this system.According to requirements analysis,system data,process and function design.System is based on B/S architecture,VB.NET as the programming language,using the front-end user interface to edit ASP.NET,SQL Server 2005 as the database program.The system includes checking the disk files,check e-mail records,check the removable storage media to use and test results demonstrate functional modules,scientific management of the user's terminal.The system can provide an example of a useful reference for other agencies,information security construction enterprises and institutions.The system is in accordance with the software engineering development process,confidential information to check the entire system development cycle in detail.In the system requirements analysis phase,to determine the feasibility of the system development and to determine the users of the system functional requirements and non-functional requirements;in the system design phase,the system module detailed design,and identified with the principles of database design goal completed database design;in system implementation stage,the main module system implementation process were discussed,with emphasis on the safety aspects of the system are described;in the system testing phase,clear principles and methods of system testing,test steps and test environment,test cases and select the part of the testing process are discussed in detail,this development has been tested and considered confidential information to check the system to achieve the requirements analysis phase of requirements,to achieve the desired goal,the project has a certain value.
Keywords/Search Tags:local area network, Confidential checks, Information security, Windows hosts
PDF Full Text Request
Related items