英语论文
原创论文
留学生作业
英语论文格式
免费论文
essay
英国硕士论文
英国毕业论文
英语论文
留学生论文
澳大利亚论文
新西兰论文
澳洲Report
澳洲留学生论文
美国留学论文
Dissertation
美国硕博论文
essay case
Eassy
Term paper
英语毕业论文
英文论文
课程作业
德语论文
德语专业论文
德语本科论文
德国留学论文
Assignment
日语论文
韩语论文
法语论文
俄语论文

信息系统安全的分析

时间:2021-09-01 来源:未知 编辑:梦想论文 阅读:
The security of the computer information system, the information about user privacy, for enterprises related to the economic development of the enterprise, in the application of computer information system of the current work, strengthen the information system security is particularly important. The computer information security system more diversity, has a great threat to the security of information users, through the theory of computer analysis of information system security measures, can theoretically solve the security of computer information system to provide support, play a better role in promoting computer information system.
 
1, computer information system security types and influencing factors analysis
 
1.1, computer information system security analysis
 
There are many types of computer information system security, which is the main aspect of the computer's physical security, information security and network transmission security and hardware and software security level. From the level of information security is the integrity of information and confidentiality and availability of security. In the network transmission security level, due to the computer network types, it is easy to appear in the transmission of information security issues, the security of network transmission is also important to ensure that [1]. Then there is the safety of computer hardware and software, hardware, computer information systems running carrier, in terms of hardware security is more important to strengthen. The security of the software is the security of the operating system and the security of the management.
 
The security content of the computer information system is also an important method to ensure the security of the system. Mainly is the computer information system user's security consciousness as well as the security technology and the legal consciousness content, strengthened in these aspects, the computer information system security can also be effectively guaranteed. In the current computer users need to improve the security of the current situation, some of the information chaos and copy of the problem is still more prominent [2]. In the user's security level to strengthen the protection of computer information system security can be effectively protected.
 
The safe operation of computer information system is also important. The safe operation of the computer is the correct handling of the information, and give full play to the function of the system to ensure the safety of computer information. In computer security, there are also many contents, including the risk management and audit tracking and emergency management is more important. For example, in the level of risk management, is an important measure of computer information system security protection, computer information systems may encounter security risks to be defensive.
 
1.2, computer information system security factors analysis
 
There are various factors that influence the security of computer information system, in which the virus has a direct influence on the security of computer information system. Computer virus itself has a latent and rapid spread characteristics, there is a great threat to the security of the computer information system, the emergence of computer viruses can cause paralysis of the information system, resulting in the loss of information and data, the security of the entire network system also has the very big threat. Latent computer virus itself is more prominent, will depend on the procedures and software, in the computer information system, will continue to expand, resulting in the computer information system paralysis, influence the normal use of computer [3].
 
Computer information security system is also reflected in the impact of hardware and software vulnerabilities. The application process of the system, whether it is a computer software and computer hardware, there will be some vulnerabilities, these vulnerabilities are criminals attack breakthrough, using some hackers on the computer information system vulnerabilities, to destroy the system, steal information system etc.. Serious paralysis of the entire network server, computer users have a serious damage to their own interests. In different computer hardware and software system settings will have different vulnerabilities, which is an important factor affecting the safety of computer information systems, these factors should be eliminated in time is more important.
 
The influencing factors of computer information security are also reflected in the human level. Under the influence of human factors, the security of computer information system will also be a great threat. Some computer users in the security awareness is not strong, the application of the computer system does not pay attention to security settings, no access to the system settings, which is more vulnerable to hacker attacks. In the course of the operation, it will cause the loss of information data, such as [4]. With these levels of computer information system security issues, it is necessary to pay attention to the impact of these factors in detail, to find targeted response measures.
 
2, computer information system security policy features and design scope and principles
 
2.1, computer information system security strategy features analysis
 
The security of computer information system should pay attention to the scientific formulation of the strategy, and it has distinct characteristics in the formulation of the security policy. Security policy is an important measure to deal with the security problems of computer information system, which is more prominent in the integrity of the security policy and the characteristics of certainty and effectiveness. In the overall security features of the strategy is more important in the computer information system security and security of data information security and Internet security, are more important protection content [5].
 
In the security strategy, the certainty is to prevent the security risks to be determined, and the effectiveness of the security policy is to effectively prevent the actual information system security issues.
 
2.2, computer information system security policy design scope analysis
 
Computer information system security policy design should pay attention to the scope of the effective grasp, combined with many aspects of the security policy to be perfect. In the physical security strategy of computer information systems and network security strategy and data backup strategies, it should be safe and practical combination of the status quo, in scope to expand, the only way to contribute to the security of computer information system.
 
2.3, computer information system security policy design principle analysis
 
In the process of designing the computer information system security policy, we should follow the corresponding principle. In the formulation of the information security strategy, the application of advanced network technology science should pay attention to, but also pay attention to the security risk to the user's own assessment, the safety mechanism of the choice of scientific and technical application, and then combined to form a comprehensive security system.
 
In the design of security strategy of computer information system, the safety management level to strengthen the importance of safety management in computer network, use will be perfect, in the internal and external management should be strengthen, and to strengthen the construction of the safety audit and tracking system, to strengthen the security awareness of Internet users. From the legal level to improve the development of computer information system security support.
 
3, computer information system security strategy and technology application
 
3.1, computer information system security strategy analysis
 
First, the implementation of the security policy of the computer runtime environment. Computer information system security measures should be diversified, which is more important in the field of environmental security. Also the environmental safety operation of computer hardware and software to be protected, from the specific implementation of the method, improve the structure of the computer will pay attention to the place and facilities, to meet the needs of practical application. In place of computer equipment to be reviewed, to give computer equipment have enough space, has a plurality of entrance and exit, in the environmental protection equipment for the storage of the information security level, makes clear the room. In order to ensure the safety of the air conditioning system, it is necessary to consider the operating temperature and humidity and cleanliness of the computer system. The computer system is in operation, there are many components are heat dissipation, high temperature or low temperature of the computer system components may be damaged, so should pay full attention to the temperature control, and strengthen in the humidity control, the cleanliness of the [6] and to maintain the cleanliness of the room and equipment. Attention should also be paid to the implementation of the fire prevention mechanism, the standardization of power supply and power supply should be guaranteed.
 
Second, the implementation of computer data backup strategy. The implementation of computer data backup strategy, should pay attention to avoid the risk of storage, and the data classification properly handled, strengthen the importance of business data and key data protection system, the data backup can be applied to the network backup system, through the application of centralized management and automatic backup and database backup and recovery methods, can the safety of data information can be protected. Can also be applied to the backup software, which can effectively protect the integrity of data information.
 
Third, the implementation of computer data security strategy. The safety and security of computer information system, the data encryption strategy implementation level is more important, in the process of encryption data information and encrypted data processing to strengthen the attention, to ensure that no further information from the system to read data encryption, to write data encryption strategy, do not involve too many details. Encrypted data, full attention to the language easy to understand, to avoid the use of high technology vocabulary. In the implementation of the encryption of the information data, it is mainly to the daily storage of the ordinary files and the storage and transfer of data.
 
3.2, computer information system security technology
 
First, the application of firewall technology. The application of computer information system security technology, we must pay attention to the application of various technologies. In the application of firewall technology to be scientific, which is based on the modern communication network technology and information security technology based on the security technology. The application of firewall technology, is mainly set up in different network technology, network security is not the only entry and inter domain information, has a strong anti attack ability in the application of firewall technology, the more prominent the protective effect of security information system, can guarantee the internal network security. In the application of wall protection technology, all security software can be configured on the firewall, so as to effectively monitor and audit the network access and access.
 
Second, the application of intrusion detection technology. The security of computer information system can play an active role in the application of intrusion detection technology. Application of intrusion detection technology of the security operation of the computer information system is more prominent, it can detect the suspicious program, and intercept, plays a positive role in ensuring the security of the information system of computer.
 
Third, the application of network encryption technology. The application of network encryption technology in computer information system security protection technology is more important. If the computer network transmission process for Caesar cipher plaintext corresponding to the ciphertext, then FDHVDU FLSKHU, plaintext and ciphertext always is three characters, to increase the difficulty of deciphering the substitution cipher, may be appropriate to increase the unlocking process plaintext ciphertext, multi-level encryption. Through the application of network encryption technology, information security and transmission security can play a role in the protection.
 
Fourth, the application of pulse code modulation. The safety protection of computer information system, in the application of pulse encoding modulation technology, the implementation of channel simulation waveform encoding in the waveform of the transmitted data, the time and the value of the discrete signal waveform, such as sampling signal frequency range is set to FM, the current system in the sampling frequency is 2.0fm, which is about 6000Hz, so only when the signal the frequency of F is more than 2.0fm, can accurately read the information data. The current use of binary encoding, in the 8 bit PCM coding applications, can improve the security of information.
 
4, concluding remarks
 
To sum up, the security problem of computer information system has become more and more prominent, so it is very important to strengthen the security of computer information system. In the analysis of computer information system security strategy and corresponding technology, can guarantee the safety of computer information system for the actual play theory support, hope that through this research and analysis, computer information system security of the actual play a positive role in promoting.
 
Reference
 
[1] Shao Fang. Computer information security storage and utilization of [J]. electronic world, 2014 (9)
 
[2] Liang Guoquan. On computer system security and computer network security [J]. Heilongjiang science and technology information, 2014 (35)
 
[3] Cao Mu Mu. New features of computer information security [J]. Journal of Jilin Institute of Education: Discipline edition, 2015 (10)
 
[4] Liu Yongbo, Tan Kai Connaught. Review of computer system security [J]. China Hi tech enterprise, 2014 (1)
 
[5] Guo Hui, Sun Guochun, Yu Qiu. Security analysis of computer network [J]. network and information, 2015 (8)
 
[6] Chen Qinghua on the computer network in the "rogue software" [J]. Canada, 2014 (12).
分享到:
------分隔线----------------------------
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
最新评论
随机推荐美国留学论文