Font Size: a A A

Design And Implementation Of Integrated Management System For Classified Protections Of Information System

Posted on:2018-03-28Degree:MasterType:Thesis
Country:ChinaCandidate:B F WangFull Text:PDF
GTID:2348330542478098Subject:Engineering
Abstract/Summary:PDF Full Text Request
In recent years,due to the frequent information security incidents and information leakage,increase in hacking attacks and the theft of personal information,the developing informatization has suffered a serious crisis of confidence.In order to improve the effectiveness of the information security management,the Government has made a set of policies and procedures to guide the construction and management of information security.Through the detailed analysis of the security status and the summary of management issues,it is concluded that there is an urgent need for a comprehensive management system to improve the efficiency of management,which can achieve comprehensive management and control on the statistic of the security status,the track of security issue rectification,automation of risk assessment,making proper plans and guidance,and so on.Though information security protection has been carried out throughout the country for many years,the information security management is inefficient and the situation is very serious,as many managers ignore the information security and are lack of expertise.Information Security Level Protection Integrated Management System provides an efficient management solution to resolve the current issues.The system proposed in the thesis is designed and developed in strict accordance with the management requirements of Information Security Level Protection and the specificity of the information security management.Fully considering the variability of information security,the proposed system is developed by Java platform that has strong compatibility and portability.In order to satisfy the safety,scalability and stability,the modular design is employed.The open source development language and Mysql database are chosen to satisfy the requirement of security management.The role set and authority assignment are under the security management principle,the way of first-reading-last-writing is used to ensure the reality and integrity,and the audit account is set up for the audit of the whole security management process.The system can record current security status,find shortcomings of security management by risk analysis,and provide reasonable guidance and advice.It can continuously track the security management status,vividly display the invisible management work to administrators,and therefore improve the management efficiency.Through the sufficient tests,the system is confirmed to have perfect function and stability,and the target is achieved.The proposed system plays an important role in improving administrators' professional knowledge and management efficiency.The system has good practicability and use value.
Keywords/Search Tags:Data Security, Password Security, Computer Technology, Information Security
PDF Full Text Request
Related items