| With the rapid development of information technology, whether have steady information security is basic condition for development of a Enterprises which planed to success, at the same time, in the information era, Internet has become the main channel for corporate communication and the exchange of business data. Although the Internet has greatly reduced the cost of communication, the security of information include copyright and other sercret data is not steady. The enterprise would have an irreparable loss after spread of confidential information,.As the computer and information security technology development, corporate network or internal network already have better guard against to external attacks. The firewall is separation of the external network by checking all the passive flow of network packets, and then blocking communications discover the violation of security policy. However, the company's security data or security issues can not be protect by the firewall, it is necessary for the company that the network security management system solutions to ensure data encryption, storage and monitoring, and make rapid response to the spread of information .So, we analysis the actual needs of company information security, and then design and development of an enterprise-specific information security monitoring system, it is a network and computer operation monitoring system, in the internal network, through an external device (U disk, mobile hard disk, red Outside, etc.) and control communications network, it can supply the situation on the internal security in the host data in real-time monitoring and storage at any time. Enterprises is used to forbid the spread of information from internal to external by firewall and other equipment, at same time,it also can prevent the information not spread to the outside illegally by internal monitoring system , by this way, the entire internal network systems and data security can have a powerful guarantee.The research of this article is enterprises-oriented information security systems, including the following three aspects: (1) the overall design of the system.it's design the entire framework of the modular system, and identify related technologies and detail methods used in the various modules.(2) Complete client by the key technologies: resource monitoring, operation monitoring.(3) The design and implementation of the background data processing. It includes data receiving part and database processing part. The first part is used to receive data from cilent and save it to the database, then get the command and send back. The second part implements show and anaylsis client data by admin part and generates command message.The platform has a high utility value and completely carries out it design focusing on the special need of enterprises for information security. Moreover, it has a good expansibility which only modifies part of its code to meet the need of different enterprise. |