Font Size: a A A

Design And Implementation Of Information Security Management Platform For Military Enterprises

Posted on:2021-02-08Degree:MasterType:Thesis
Country:ChinaCandidate:L C ZhuFull Text:PDF
GTID:2428330626455816Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the continuous and in-depth development of the national military industry,information service has been extended to simulation,analysis,design,manufacturing and other aspects in the production and manufacturing of state-owned military enterprises.The management department has made large-scale construction and investment in the field of informatization in combination with the best practices of industry informatization and the prospect of technological development.At the same time,Due to the particularity of enterprises in terms of security and confidentiality,the construction of information security protection has also been strengthened year by year,the rules and regulations and management norms related to information security have been revised and improved,and many information security products have been put into construction.The main work of this thesis comes from the needs of data network security,data security and operation security related to the daily production of state-owned enterprises,and proposes to establish a multi-dimensional risk analysis and evaluation system so as to establish a scientific and credible risk evaluation system.On the basis of scientific and accurate analysis of the impact of enterprise-level IT equipment system vulnerabilities,this paper conducts multi-dimensional risk analysis and assessment according to relevant industry standards and in combination with the actual situation of enterprises,and divides vulnerabilities into major levels and important levels of IT equipment,providing important reference for the rectification of vulnerability risks.The ES big data log analysis engine component and the information security risk assessment standard are used to realize the automatic risk calculation and information security risk situation analysis of information security management objects.At present,The system has been applied to the daily monitoring and management of enterprise data centers.Practice has proved that by extracting,integrating and multidimensional analyzing the system logs of security products,not only can the risk loopholes in the operation process of information systems be analyzed,but also the real-time warning of high-risk risks can be formed.This system can well meet the confidentiality requirements in the scientific research and production data exchange of state-owned enterprises and has good practical significance.
Keywords/Search Tags:Information security, Risk assessment system, Situation analysis, Real-time early warning
PDF Full Text Request
Related items