Font Size: a A A

Implementation And Design Of Secret Computer Monitoring And Auditing System

Posted on:2017-02-06Degree:MasterType:Thesis
Country:ChinaCandidate:B X FanFull Text:PDF
GTID:2348330518995874Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years,with the rapid development of information security and the growing need for protection of secret information,thereby monitoring and protection of secret computer technology to be applied.However,the secret computer monitoring products often lack timely and effective protection and strategic planning,while the lack of protection protection product itself,secret computer needs more underlying and comprehensive monitoring tools.Secret host monitoring and auditing systems are designed and applied in such a case,it is intended for the use of secret computer security,the underlying behavior monitoring to develop a comprehensive protection program to provide a safe environment for the use of secret computer.(1)Come up with a client/server architecture,the client has completed a multi-level,multi-dimensional monitor,such as process monitoring,service monitoring,client outreach surveillance,monitoring the use of some of the equipment,At the same time alarm information through timely feedback on the server side to develop appropriate conservation strategies through management platform.And from the classified computer monitoring technology and server-side policies formulated and issued two aspects to ensure the usefulness of classified computer monitoring and auditing systems.(2)The detailed design of the system and part of the classified computer monitor client design a multi-dimensional monitoring module designed server modules and communication modules,and in order to visualize the alarm information and policy formulation,but also designed the console interface,you can easily manage policies and alarm information,analysis classified computer to upload the audit log.(3)The results of experimental tests reflects the system’s security,integrity and usefulness of the process to achieve the system is safe and effective application of the broader scene,apply to classified computer monitor and audit the current provision of services,to improve concurrency show some secret computer monitoring and auditing Architecture technology has a certain practice and guidance.
Keywords/Search Tags:Secret computer, Monitoring and auditing, Security Strategy, Host Protection
PDF Full Text Request
Related items