Font Size: a A A

Design Of Security Protection Architecture For Secret-related Information System Of E-government Intranet

Posted on:2021-05-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y N CaoFull Text:PDF
GTID:2518306464968739Subject:Computer technology
Abstract/Summary:PDF Full Text Request
E-government secret-related information system is a state administrative agency unit using modern computer technology and network information technology to store various data and documents within the government in digital form in the intranet server,which can be quickly inquired and accessed through the intranet terminal The content needed to achieve an efficient and standardized internal office system.With the occurrence of various information security incidents every year,people are paying more and more attention to the leakage of personal information,especially the confidential departments dealing with national affairs,and more attention to the security defense capabilities of their own government affairs networks.Under the guidance of General Secretary Xi Jinping's key thoughts on Internet power,China's Internet infrastructure has been accelerated,independent innovation capabilities have been continuously improved,core technologies have advanced by leaps and bounds,significant progress has been made in the digital economy,and network security capabilities have continued to grow.The project has made historic achievements,made Chinese contributions to the development of the global Internet,and gave Chinese experience.In recent years,my country has made great achievements in the construction of government information security and the rule of law,and has invested a lot of money in the construction of government affairs networks.Government departments have introduced hierarchical protection and grades for the security construction of egovernment intranets.The mandatory requirements for protection and other aspects have detailed regulations for each link of project implementation.From the perspective of overall functions and experience,it can meet the basic needs of users,but with the development of network information technology,related threats and risks have become more and more prominent,such as network security design,network architecture vulnerabilities,etc.Will pose more or less threats to the security of the existinggovernment intranet.To this end,this article combines the design of the security protection architecture of the e-government intranet,analyzes the security problems existing in the construction of the intranet,and optimizes the design of its government network security to achieve the reliability and effectiveness of network security applications.This paper constructs the various modules of the security protection architecture applicable to the e-government intranet as a whole.Based on the research of current egovernment issues,it analyzes the security risks existing in the current e-government intranet framework structure,from the application system security Starting with the security of the network system,using the idea of separating the three members,the most basic operator safety management is designed to avoid the risk of illegal operations caused by the overwhelming power.At the same time,a local user intrusion based on the terminal host is designed and written The detection system can detect abnormal access of internal personnel.Then in terms of network system security,the next generation firewall technology and the virtual design of network intrusion detection are used to protect each sub-domain.Finally,the use of link redundancy,PQ-checked disk arrays,and disaster recovery in A and B are designed to effectively protect and back up data.The test results show that the security protection architecture provided in this article can better protect various devices from external attacks and improve the security of government network information,which has certain practical guiding significance for the safe and reasonable construction of the e-government intranet platform.
Keywords/Search Tags:E-government, Information system, Protection architecture, Identity authentication, Data backup
PDF Full Text Request
Related items