Case study on dynamic monitoring and early warning information system of national major construction projects [8]

Source: Internet
Author: User
Keywords Information systems prevention security Internet network services

National major construction project dynamic monitoring and early warning http://www.aliyun.com/zixun/aggregation/32730.html "> Information system case [8]

http://www.csai.cn Author: unknown Source: E-Government Engineering service Network January 2, 2008 comment into the community

5. Video Monitoring Subsystem

According to the setting conditions, real-time video monitoring and recording can be carried out on the actual construction situation of multi project construction site.

  

6. On-Site inspection subsystem

According to the main design basis of "national major project inspection and working papers", it is the Assistant tool and digital Office platform for the Inspectors of the Development and Reform Commission at all levels.

7. Statistical analysis Subsystem

To realize the digital, networked and database management of the inspection information of several checked items.

Security Solutions

Design requirements for security secrecy systems

According to the requirements of the system, when the network servers distributed in each province and project construction unit are interconnected through Internet, the security design of each Internet node must satisfy the general Internet Security application, and can realize the secure interconnection between the network servers. Its design requirements are as follows:

1, Security Unit Extranet and Internet interface network should first be able to ensure the basic interface security, can effectively prevent the Internet hackers illegal intrusion, to prevent network violations. Comply with the national management requirements for Internet security applications.

2, the confidentiality of the national authorities identified by the high complexity encryption algorithm, the network server to encrypt the connection to protect, to prevent third parties to steal communications information, to achieve the confidentiality of communications.

3, the integrity of the transmission of information using one-way function algorithm and digital signature for protection and verification, to prevent the Internet in transit was tampered with to ensure the integrity of the communication data.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.