Font Size: a A A

Research On Information Security Management System Of Yunnan X Telecom Operator's Business Support System In The Internet+ Environment

Posted on:2019-06-15Degree:MasterType:Thesis
Country:ChinaCandidate:N D ZhangFull Text:PDF
GTID:2439330548475212Subject:Project management
Abstract/Summary:PDF Full Text Request
In the internet+ environment,application of technologies such as virtualization,cloud computing and big data has become more extensive,allowing individuals to trade online more frequently.However,this may increase the possibility of personal information leakage in the internet+ environment.Since the State-owned Assets Supervision and Administration Commission of the State Council(SASAC)implemented the real name registration system for mobile users,business support systems of telecommunications service providers have also stored a lot of personal information of users,which is not only accurate,but also sensitive.As user-oriented functions of the business support system gradually become available on internet,the environment that the business support system is faced with turns from a closed one into an open one.This makes the information security risk of the business support system become higher.Therefore,conventional information security management measures of such systems cannot effectively deal with current information security risks in the new environment.How to deal with risks and problems related to information security management for existing business support systems? Based on project management-related theories and experience in information security management,the paper took into consideration actual conditions of telecommunications operators to analyze and elaborate problems,causes and countermeasures of information security management of business support systems in the new environment from following four aspects: information security system,organization,procedures,and measures implementation by technical approaches.At first,the paper proposed that with respect to information security management,top leaders should work out and implement relevant information security management systems and lead others to deal with affairs in accordance with specified procedures.In addition,they should ensure successful implementation of information security management works in terms of capital investment and organization.Secondary,new procedures of information security management should be added or original procedures should be adjusted based on actual conditions to confront challenges brought by new technologies and environment.At last,based on actual conditions of business support systems and actual investments,new information security equipment and systems should be flexibly applied,so as to implement the information security management systems and procedures.Therefore,supported by management and management technologies,a complete information security system can be established for business support systems to boost development of telecommunications operators.
Keywords/Search Tags:Internet+, Business support system, Information security management systems
PDF Full Text Request
Related items