Font Size: a A A

The Design And Implementation Of Computer Configuration Check And Deployment System Based On Baseline Management

Posted on:2018-04-15Degree:MasterType:Thesis
Country:ChinaCandidate:X T L a r r y WangFull Text:PDF
GTID:2348330515991772Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The computer terminal is not only the starting point of network behavior,but also the source of all kinds of attacks.With the increasingly complex network environment and the increasingly serious security situation,the government and the industry has long been the focus of attention to ensure the safe and reliable operation of computer terminals.Gateway,firewall and VPN technology have been unable to effectively protect the security of the network,which makes people have to break the traditional security boundaries,thinking of a new means to enhance the security of computer terminals.This thesis is based on the development of national standards,which mainly studies the security core configuration of the government computer terminal which is in accordance with the requirements of the information system security protection.Through in-depth study of the domestic and foreign research results of the core configuration,combined with the business needs of government computer system management,this thesis designs and implements a computer configuration check and deployment system based on baseline management.This system is used to set and monitor the core configuration items in the whole network computer operating system.This thesis starts with the research and development of the core configuration technology and principle.The security requirements of a computer terminal are converted to a language that the operating system can identify,and a baseline package for a computer configuration verification system can be generated.Then,based on the core configuration principle,the system is designed and implemented.Finally,the system is deployed and tested in the real environment,and the practical application of the system is demonstrated.Through the study of this system,it can provide a unified security policy configuration and real-time monitoring of the security status of the whole network computer terminal,which can effectively improve the security and operational efficiency of the terminal.
Keywords/Search Tags:CGDCC, computer, baseline, terminal security, Core Configuration
PDF Full Text Request
Related items