Font Size: a A A

Design And Development Of CD Encryption And Security Management System

Posted on:2019-12-08Degree:MasterType:Thesis
Country:ChinaCandidate:H ZhangFull Text:PDF
GTID:2518305654959019Subject:Computer Software and Application of Computer
Abstract/Summary:PDF Full Text Request
In the information exchange medium,CDs are widely used by people for their low price,large storage capacity and the like.However,the following security problems often occur during the use of the optical disc: Information leakage caused when an important user information is stored on the optical disc due to a lost optical disc,information leaked when a user uses a plaintext carved into a disc,Survey is difficult to wait.These security issues bring great risks to the important information transmission using optical discs.In view of the above problems,through the use of information security technology such as symmetric encryption algorithm,RSA asymmetric encryption algorithm,UK electronic lock,SHA hash algorithm,Burn and security management software and hardware systems,CD burning and management provides a new method of means.The main work of the dissertation is as follows:Design and development of a CD-ROM encryption recording system.Through the use of software and hardware encryption of important data protection,to achieve the ciphertext hidden burn,in ordinary optical drive,can not see nor can read the encrypted CD-ROM storage of confidential information;when you need to read the ciphertext,you must UKey can read ciphertext with the supporting double security hardcore audit system software and encryption burner,and the unified distribution of security department to ensure the safety of important data.By encrypting and authoring CD-ROMs,unauthorized users can not read confidential information on a CD-ROM even if the CD-ROM is lost,greatly improving the security of important information.Design and development of CD burning security authorization system.In order to prevent the bad operation of the user,the system controls users to read and use information by classifying the users into different levels and configuring different execution rights for the users,thereby preventing the user from burning the secret data or other unauthorized operations.When encrypting and recording,the public key corresponding to the private key of each unit in UKey can be chosen to encrypt the random data key,so as to realize mass communication or one-to-one communication at all levels so that confidential information is only used for a specific user group or user Visible,strict control of the confidentiality range.Design and development of CD burning audit system.The system registers the user's burning behavior and uploads it to local and remote server log files for recording.It is convenient for the auditors to audit and inquire the users in the system.When the information security incidents occur,the security incidents can be traced back for the purpose of locating the information security vulnerabilities,analyzing the reasons for the security incidents and the location of the security breaches,and preventing A similar incident happened again.Finally,a conclusion is given and the future researches are also discussed.
Keywords/Search Tags:CD-ROM, encrypted burn, hidden burn, authorization, security audit
PDF Full Text Request
Related items