Font Size: a A A

The Design And Implementation Of Secret Disc Burning Monitoring Auditing And Violation Alarm System

Posted on:2017-01-24Degree:MasterType:Thesis
Country:ChinaCandidate:J F LiFull Text:PDF
GTID:2348330521950346Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In the data exchange and the storage applications of the classified information system,disc with Read-only,one-time data is written,not easy to infect the Trojan virus,easy to carry and a low cost,it has became the preferred data exchange and storage medium.Currently in the use of classified technical data discs,has lacked technical control measures,disc data security cannot be guaranteed.Therefore technically effectively controlled burning behavior and in the secret use of the disc ensure data security,it has a very important significance.This paper based on secret disc into the burning and use the security and confidentiality of the specific application requirements,through disc encryption,virtual appliances,driving filtered,one-way import and real-time location technologies such as the Internet,applications Win DDK driver,SQL database and IIS Web service,to design a safe and efficient,controllable and reliable disc burning secret surveillance audit and compliance alarm system,to achieve the right management,burn control,data encryption and read burning,illegal warning,behavior audit query and other major functions in the implements disc burning and use the windows operating system.After the system application,can effectively eliminate the disc is not standardized security risks posed,prevent leaks of classified disc fault occurs during use,positioning analysis of illegal use of classified computer discs and disc original secret data,to provide effective protection for data security secret disc,while providing technical support for the investigation of secret illegal discs events.
Keywords/Search Tags:Secret disc, Burning, Monitoring and auditing, Violation alarm
PDF Full Text Request
Related items