Case study on dynamic monitoring and early warning information system of national major construction projects [9]
Source: Internet
Author: User
KeywordsSecurity information systems prevention stability must
National major construction project dynamic monitoring and early warning http://www.aliyun.com/zixun/aggregation/32730.html "> Information system case [9]
http://www.csai.cn Author: unknown Source: E-Government Engineering service Network January 2, 2008 comment into the community
4, the identification of the establishment of a rigorous channel connection equipment certification, communication between the two sides before communicating, must first identify and verify the identity of each other, confirm before the official contact. The use of centralized user management and blacklist disclosure services, the total restriction of illegal users into the protection system.
5, the reliability of the firewall set up, VPN encryption equipment must be stable and reliable, can not affect the availability of the network. Set up Network Level anti-virus system, find and eliminate the network virus in time, ensure the normal operation of the network.
In accordance with the above design requirements, provide the overall security system solutions to ensure the integrity and security of transmission information, so that the network has a strong intrusion monitoring and monitoring and early warning capabilities, the selection of security and password equipment in line with the relevant national security regulations, to ensure the efficiency and stability of online security equipment.
8. Online Office Subsystem
Project-centric collaborative office platform, including short message, mobile message, document processing, office processes, to do work, news Center, Knowledge Center.
9. Basic Data Maintenance Subsystem
Initialize the system to set up, the corresponding code data to add, delete, change and other maintenance.
10. Authority Management Center
To manage the user rights, roles and logs of the system, ensure the security, confidentiality and orderly operation of the system, and ensure that the information of major construction projects is processed, consulted, disclosed and explained according to the corresponding procedure and authorization mechanism.
Design requirements for security secrecy systems According to the requirements of the system, when the network servers distributed in each province and project construction unit are interconnected through Internet, the security design of each Internet node must satisfy the general Internet Security application, and can realize the secure interconnection between the network servers. Its design requirements are as follows:
1, Security Unit Extranet and Internet interface network should first be able to ensure the basic interface security, can effectively prevent the Internet hackers illegal intrusion, to prevent network violations. Comply with the national management requirements for Internet security applications.
2, the confidentiality of the national authorities identified by the high complexity encryption algorithm, the network server to encrypt the connection to protect, to prevent third parties to steal communications information, to achieve the confidentiality of communications.
3, the integrity of the transmission of information using one-way function algorithm and digital signature for protection and verification, to prevent the Internet in transit was tampered with to ensure the integrity of the communication data.
4, the identification of the establishment of a rigorous channel connection equipment certification, communication between the two sides before communicating, must first identify and verify the identity of each other, confirm before the official contact. The use of centralized user management and blacklist disclosure services, the total restriction of illegal users into the protection system.
5, the reliability of the firewall set up, VPN encryption equipment must be stable and reliable, can not affect the availability of the network. Set up Network Level anti-virus system, find and eliminate the network virus in time, ensure the normal operation of the network.
In accordance with the above design requirements, provide the overall security system solutions to ensure the integrity and security of transmission information, so that the network has a strong intrusion monitoring and monitoring and early warning capabilities, the selection of security and password equipment in line with the relevant national security regulations, to ensure the efficiency and stability of online security equipment.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.