Font Size: a A A

Tobacco Fund Management Network Security

Posted on:2008-04-14Degree:MasterType:Thesis
Country:ChinaCandidate:Z P YangFull Text:PDF
GTID:2208360245955653Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The developmental process of tobacco industry has run from Extensive management to Intensive management. The establishment of Capital Centralized Management system is an important measure for Intensive management of Yunnan Provincial Tobacco Company, by using the way of two route of "income-payout" to manage. In the process of software design, we use the B/S model, which deals with many members' units such as the banks, telecommunications, etc. Because the capital current of Yunnan tobacco is very large and the capital flows frequently, the request to capital security is urgent and require strict secure schema of network management.According to above case, this article analyses the circumstance of network security, the means of network attack. Because of the popular anti-viruses technology at the present, data cryptogram and compression technology, VPN technology, firewall technology, database secure technology, we build the network secure technology of capital managerial center of Yunnan Provincial Tobacco, which include the secure schema of capital managerial center, bank-edge, client-edge, and present the execution means of assessment.1. Capital management center. By using the secure technology of network entity, the defensive technology of database, the technology of hoststandby, firewall's technology, VPN's technology, it can ensure the data security and do not be attacked by network.2. From capital managerial center to bank-edge. In the face of the transmission of data network, using high-intensity SSL of secure communicating encrypt measures can protect the users' information which can't be thrieved or modified; In the face of status accreditation, handling the most secure Public Key security system which is built through using 128-bit Asymmetric Algorithm, can effectively authenticate the user's status, identify legal user's status, and check the user's digital ID. At the same time, client certificates use supporting symmetry RSA, and store means is intellect IC card of CPU coprocessor which greatly improve the security of net banks. 3. From the Capital managerial center to user-edge. In the network frame, instating various firewall and a secure service agency, can prevent illegal incursion, and assure the security of entire system; handling VPN technology can build enterprise's network which is not limited by district but controlled and managed by the united strategy of enterprise. Firewall IP and MAC address can bind and control the user's bandwidth which can protect IP address of central machine in inter network to be not thieved and can prevent user abuse bandwidth; using firewall system of web version can defend each system and knob in network.4. Client-edge. Using code visiting technology can prevent illegal user's visiting and meantime software of anti-viruses can prevent addicted client disturbing system. Download operation system patch in time, can improve the strong capacity of system.According above conception, now it is enforced in the network security frame of Yunnan Province Tobacco Company. Initiative network defensive system can defend viruses incursion and illegal user's attack, and assure the capital managerial center system running normally.
Keywords/Search Tags:the security of network, the Capital Managerial Center, Virtual Private Network(VPN), database secure technology, assessment, secure schema
PDF Full Text Request
Related items