Font Size: a A A

Design And Implementation Of Data Security Operation Management System In Securities Enterprises Based On Cloud Technology

Posted on:2019-09-17Degree:MasterType:Thesis
Country:ChinaCandidate:Q J WuFull Text:PDF
GTID:2428330596963297Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the increase of security data and the increasing complexity of network intrusion and attack technology,the security operation and maintenance management of security enterprises is becoming more and more difficult,and the current security system has a single function and can not meet the requirements.Considering that Gou Jianxin's safe operation management system needs to invest more resources and hardware costs,This paper proposes a cloud platform virtualization deployment method to develop the data security operation management system for securities companies.According to the business requirements of security management of securities companies,the system has applied the latest information network security technology,including access control technology,data encryption technology,cloud computing technology and so on.The system uses the IaaS model in the cloud technology.Through the virtual service provided by the cloud service platform,it does not need to deploy the actual server,thus reducing the configuration cost of the hardware resources and realizing rapid deployment.The system development process is carried out according to the process of requirement analysis,design,implementation and testing.First,based on the requirement analysis of the security operation of the security enterprise,the function and performance of the system are analyzed.On this basis,the main functional modules of the system are defined.Then the system is designed.In the process of design,the server side adopts the design pattern of MVC and adopts the SQL Server2016.The design of the database,the design of each function module,the design of the system security and the design of the cloud platform are introduced.The system realizes the logic of the system through programming and shows the effect of the system through the operation page of the system.Finally,the system is tested and the test shows that: The system has complete functions and excellent performance,which can meet the original predetermined basic goals.The system has now entered the trial operation stage.By the time,the user feedback is good,there is no obvious fault in the system,and the system integrates many kinds of security technology.It can analyze the information source data of the enterprise and form the information security defense mechanism.
Keywords/Search Tags:Cloud technology, Security enterprise, Data security operation, Intrusion detection
PDF Full Text Request
Related items