Font Size: a A A

Research And Implementation Of Security Baseline Management System

Posted on:2018-07-28Degree:MasterType:Thesis
Country:ChinaCandidate:F N WangFull Text:PDF
GTID:2348330518498642Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology,information systems play an increasingly important role in our daily life.According to statistics,the information security incidents are increasing yearly.To deal with the issue and ensure the security of information systems,it is necessary to prevent attacks from every phase of security incidents.The potential hazard can only be avoided by fully awaking the drawbacks of ourselves.The effective security management of the information system can help the network administrator to well understand the security state and take timely measures to improve the security of the information systems.Since the large scale of modern information systems,the traditional way of manual testing and configuration has been unable to manage it.The software system applied to the security management of information systems is proposed to present this situation.The system can check the important assets in the information system automatically,so as to improve the ability of coping with the security risks of the information systems.This thesis analyzes the current situation of the research on the security management of information systems,and studies its theory and technology in detail.Based on this,Security Baseline Management System is designed and implemented.The system can automatically collect the information of all kinds of information assets in the network,find the hidden dangers,and provide the corresponding corrective actions for the network administrator.By automatic scanning and comparing,the errors and omissions caused by traditional manual inspection are avoided,and the security of information system can be greatly increased.As a kind of information security systems,the Security Baseline Management System was constructed of B/S architecture.The system can be deployed in the information systems.Users visit the system with web browsers and check information assets on the network.With security baseline knowledge databases built in it,the system can be used to check security configurations of operating systems,databases,middleware,switches,routers,and other equipments.Both online and offline scanning are supported.And after the scanning,a report will be provided.The system consists of task management module,security baseline knowledge databases,standard judgment center,task scheduling module,test script management module,user management module,asset management module,authentication module,audit log module,upgrade management module and so on.This thesis describes the design principle and implementation process of the Security Baseline Management System,and describes the testing process through the test example.
Keywords/Search Tags:Information Assets Security Management, Safety Baseline, Configuration Verification, Vulnerability Scanning, B/S, Python
PDF Full Text Request
Related items