Font Size: a A A

Development Of Computer Security System For Enterprises

Posted on:2017-01-31Degree:MasterType:Thesis
Country:ChinaCandidate:J W WangFull Text:PDF
GTID:2428330590468420Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of network technology,more and more enterprises will manage the business on the Internet,but security problems appear when works seems to be easier than before.Ignoring the protection of the system because of convenience will often cause irreparable loss.Nowadays computers of enterprises often store large number of confidential documents,and intrusion technology is developing rapidly today,a mature security protection system will only bring users misunderstanding of safety,which will probably cause information security leaks.At first,this paper analyzes the situation of computer security protection technology,determines the background,objective and task.Then it investigates the key technologies of the system,including login authentication,virus,windows kernel development and filter driver.A solution of computer security system for enterprises is proposed to provide safety protection for enterprises.Then,starting from the requirement of the system,this paper describes the functions of the system by use case modeling,and defines the non-functional requirement.The system architecture is designed using Client/Server Struct,which is divided into application layer,kernel layer and hardware layer.The application layer realizes login authentication,process protection,file protection and removable media protection.The kernel layer provides kernel hook,file filter driver,USB filter driver to the application layer.The hardware layer includes SentinelDog key,disk,USB and so on.For each layer,modules are designed in detail.After that,this paper implements login authentication by SentinelDog key authentication,certificate authentication,username authentication and password authentication.It implements process protection by controlling process starts,loading the kernel driver,checking the process information and adding authentic process.And it implements file protection by checking the boot process,loading the kernel driver,reading the key and controlling file read-write.It implements removable media protection by controlling access,controlling file read-write,recording operation information and withdrawing removable media.At last,function testing,UI testing and performance testing of the system are done.The results of the testing show that the system achieves the requirement of computer security.Now the system is deployed and used in the Shanghai?s Public Security Bureau,and the operation effect is good.
Keywords/Search Tags:Computer Security Protection, Filter Driver, Kernel Hook, Authentication
PDF Full Text Request
Related items