撫順市撫順縣城建局電子政務網(wǎng)絡安全系統(tǒng)的構建
發(fā)布時間:2018-04-22 11:07
本文選題:電子政務 + 網(wǎng)絡安全。 參考:《電子科技大學》2014年碩士論文
【摘要】:自上世紀90年代至今,電子政務的發(fā)展可謂日新月異,突飛猛進。隨著網(wǎng)絡技術和電子商務等新型通訊技術的不斷興起和改進,全世界各級政府部門也逐漸從完全的人工化走向智能化高精尖技術化,由此催生了電子政務這一新型事物。它作為電子信息技術與管理的有機結合,成為當代信息化的最重要的領域之一。目前,全球范圍內的電子政務網(wǎng)絡四通八達,隨之而來的就是關于電子政務網(wǎng)絡安全問題。本文通過對電子政務系統(tǒng)網(wǎng)絡中的主機程序中會出現(xiàn)的如黑客入侵、數(shù)據(jù)資源竄改或丟失、信息資源遭竊聽或修改等安全問題進行分析與研究,并提出電子政務系統(tǒng)網(wǎng)絡安全的綜合處理方案。從電子政務系統(tǒng)網(wǎng)絡的安全進行分析,之后對電子政務網(wǎng)絡安全解決方案進行分類研究,分別研究了防火墻技術,數(shù)據(jù)包過濾技術,數(shù)據(jù)加密技術,數(shù)字簽名技術,PKI,SSL協(xié)議,入侵檢測技術等。作為一個研究應用工程實例,通過對撫順縣城建局電子政務信息網(wǎng)絡的風險分析及安全需求分析,對其網(wǎng)絡安全的整體解決方案進行詳細設計。工程分別做了訪問控制設計,物理安全設計,通信機密設計,入侵檢測設計,病毒防護設計,備份恢復設計以及安全管理設計等,以期為撫順縣城建局電子政務工作的有效開展提供理論依據(jù)。本文的工作內容為:(1)對現(xiàn)有的網(wǎng)絡安全技術進行研究,總結出最適合城建局電子政務系統(tǒng)網(wǎng)絡安全的技術方案。(2)對電子政務系統(tǒng)的網(wǎng)絡安全進行需求分析,分別從可行性分析,模塊需求,功能需求等方面來分析。(3)對撫順縣城建局電子政務系統(tǒng)的網(wǎng)絡安全系統(tǒng)進行總體設計和詳細設計。(4)對撫順縣城建局電子政務網(wǎng)絡安全系統(tǒng)進行設計與實現(xiàn)。最后,通過分析國內外網(wǎng)絡安全研究現(xiàn)狀,分析現(xiàn)有網(wǎng)絡的不足,缺點和漏洞,得出開發(fā)電子政務網(wǎng)絡安全系統(tǒng)的必要性的結論。本文先從工程的需求出發(fā),通過需求分析和系統(tǒng)設計得出系統(tǒng)的整體架構,之后再對系統(tǒng)進行詳細的設計,得到每一部分的設計思路,最后對每一個模塊分別的實現(xiàn)其功能。此外,還要在適當?shù)沫h(huán)境中對系統(tǒng)進行測試,進而完善系統(tǒng)。
[Abstract]:Since the 1990 s, the development of e-government can be described as rapid and rapid progress. With the rise and improvement of new communication technology, such as network technology and electronic commerce, all levels of government departments in the world have gradually changed from completely artificial to intelligent and sophisticated technology, thus giving birth to e-government, a new kind of thing. As an organic combination of electronic information technology and management, it has become one of the most important fields of modern information technology. At present, the network of e-government all over the world, followed by the issue of e-government network security. In this paper, we analyze and study the security problems such as hacker intrusion, data resource tampering or loss, information resource eavesdropping or modifying, which will appear in the host program in the network of e-government system. And put forward the comprehensive processing scheme of network security of e-government system. This paper analyzes the network security of E-government system, then classifies the security solutions of E-government network, and studies the firewall technology, packet filtering technology, data encryption technology, digital signature technology and PKI / SSL protocol, respectively. Intrusion detection technology. As an example of research and application, through the risk analysis and security requirement analysis of the E-government information network of Fushun City Construction Bureau, the overall solution of its network security is designed in detail. The project has made access control design, physical security design, communication secret design, intrusion detection design, virus protection design, backup and recovery design and security management design, etc. In order to provide theoretical basis for the effective development of e-government work of Fushun City Construction Bureau. The content of this paper is: (1) researching the existing network security technology, summing up the most suitable technical scheme for the network security of the city construction bureau e-government system. (2) analyzing the demand of the network security of the e-government system, respectively from the feasibility analysis The overall design and detailed design of the network security system of Fushun City Construction Bureau E-government system are analyzed from the aspects of module requirement and function requirement etc.) the network security system of Fushun City Construction Bureau is designed and implemented. Finally, by analyzing the current situation of network security research at home and abroad, analyzing the shortcomings, shortcomings and loopholes of the existing network, the paper draws the conclusion that it is necessary to develop the network security system of e-government. Based on the requirements of the project, the whole structure of the system is obtained through the requirement analysis and system design, and then the detailed design of the system is carried out, and the design ideas of each part are obtained. Finally, the function of each module is realized separately. In addition, in the appropriate environment to test the system, and then improve the system.
【學位授予單位】:電子科技大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TP393.08
【參考文獻】
相關期刊論文 前1條
1 張屹;;政府電子政務網(wǎng)絡建設現(xiàn)狀分析[J];電腦與電信;2011年07期
相關碩士學位論文 前1條
1 周芬;電子政務網(wǎng)絡安全分析與防范策略的研究[D];南昌大學;2011年
,本文編號:1786919
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/1786919.html
最近更新
教材專著