Font Size: a A A

Inner Mongolia Mobile Security Monitoring System Design

Posted on:2012-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:R Y ZhouFull Text:PDF
GTID:2358330374970603Subject:Business Administration
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile communication industry changing rapidly, the network scale of Inner Mongolia mobile company also experienced rapid development history. The number of all kinds of mobile network host equipments, network equipments, security equipments is growing rapidly. And a wide range of dispersion, deployment, and the situation that the lack of professional security monitoring, security personnel technical personnel and a full network uniform security monitor platform is gradually bringing some crisis problem to the safety management work.The network of Inner Mongolia mobile company lacks unified security platform, and also affects the security event management of the whole network. The security management mode of the host devices, the network equipments, and the security equipments is isolated from each other. And it is not conducive to a comprehensive, fast, accurate response to the occurrence of security incidents, that’s because artificial monitoring workload, low efficiency, the inability of unified collection, aggregation and association analysis of all the security log and safety alarm information. Aiming at the security alarm information and security early warning information is unable to currently analyze automatic asset, initiate safety alarm and manually or automatically send a single of warning information, which is affecting the security alarm and the fast response of warning. It also affects the security incident response efficiency due to the lack of professional safety knowledge library support services of the monitoring personnel, maintenance personnel, safety and technical personnel in the processing of security events.This thesis is described in detail on how to construct the safety monitoring platform of "active safety management automation, passive safety management intelligent" from the implementation of security alarm information is dispersed by the view, distributed processing to concentrate on, focused on analysis, monitoring response perspective.
Keywords/Search Tags:safety monitoring system, design, scheme
PDF Full Text Request
Related items