寧夏電信安全管理系統(tǒng)漏洞管理模塊的設計與實現(xiàn)
[Abstract]:With the rapid development of information and communication technology, communication network data, terminal intelligence and multimedia service bring new challenges to network security operation. Telecom operators, as national basic network operators, assume important responsibilities and responsibilities in network security. Especially after the three major operators launched 3G 4G mobile broadband service in 2008, the Internet service developed into the fast lane. In order to meet the increasing business demand of users, operators build various information service systems overtime, but the problem of network information security is also increasing. In order to deal with Internet security challenges, enterprises also deploy the corresponding network security products. These security products can meet the security requirements of enterprises to a certain extent or a single network security direction, but can not meet the needs of administrators for the overall security of the network system. On the one hand, security products are independent of each other and lack of centralized and unified management; on the other hand, because the existing asset vulnerability detection capability is completely dependent on the timeliness and initiative of updating the security scanning product signature database, If the vulnerability can not be detected and notified to the security administrator in time when the Internet is published and the security product is updated, the administrator will not be able to protect it in a timely manner, which will bring a great potential network security hazard to the enterprise; more importantly, The management of network security vulnerabilities should have the characteristics of life-cycle management and ensure that every security vulnerability found by an enterprise should be closed loop management. But at present, this work lacks the means and methods of automatic management, which makes it easy to omit or make mistakes in the management work. To strengthen the management of network security vulnerabilities is one of the most important links in the work of telecommunication network security. It is also an important means to actively defend against the threat of network security events and reduce the impact and loss of network security incidents. The purpose of this paper is to design a set of security vulnerability management system module to solve the above problems. Based on the actual security management requirements of Ningxia Telecom, the system designs and implements a vulnerability management module based on the general SSM framework. The system has basic information management, vulnerability collection and input, vulnerability management, log management. System management and other functions. The vulnerability management module collects the Internet alarm vulnerability information in real time, the host computer vulnerability scan result of the telecommunication intranet, the application software vulnerability scan result, the application penetration test result and so on vulnerability information, and the object of the security service provided by the system. That is to say, the vulnerability information of telecom assets is associated with each other so that managers can grasp the safety and health status of the whole network in time and accurately. The system is based on Eclipse visual Java integrated development environment. The SSM integrated framework is used to realize the control layer code logic of the system, and the background database is deployed using the Apache Tomcat platform in the PostgreSQL database management system. Finally, the function and performance of the implemented system are tested to ensure that the implemented vulnerability management module can meet the current security management needs of Ningxia Telecom.
【學位授予單位】:電子科技大學
【學位級別】:碩士
【學位授予年份】:2017
【分類號】:TP393.08
【參考文獻】
相關(guān)期刊論文 前10條
1 肖祥林;;基于SSM的畢業(yè)設計管理系統(tǒng)設計與實現(xiàn)[J];電子科技;2016年10期
2 白嘎力;;安全應急響應中心(SRC)是如何運作的?[J];中國信息安全;2016年07期
3 榮艷冬;;關(guān)于Mybatis持久層框架的應用研究[J];信息安全與技術(shù);2015年12期
4 徐剛;楊林海;;企業(yè)網(wǎng)絡安全控制技術(shù)分析與應用[J];信息與電腦(理論版);2015年04期
5 董紀英;燕志偉;梁正玉;;SQLite、MySQL、PostgreSQL關(guān)系型數(shù)據(jù)庫管理系統(tǒng)比較[J];電腦編程技巧與維護;2014年14期
6 李燕;曹寶香;馬兆豐;楊義先;鈕心忻;;關(guān)聯(lián)分析算法在安全管理平臺中的研究與應用[J];計算機技術(shù)與發(fā)展;2013年10期
7 羅麗娟;陳永政;;淺談MVC框架模式[J];科學咨詢(科技·管理);2013年02期
8 鄒祖軍;周偉;;信息系統(tǒng)安全審計機制的實現(xiàn)[J];信息技術(shù);2012年11期
9 徐雯;高建華;;基于Spring MVC及MyBatis的Web應用框架研究[J];微型電腦應用;2012年07期
10 徐錫霆;;以信息系統(tǒng)平臺的安全為視角淺析“漏洞”的危害及防范[J];信息與電腦(理論版);2012年01期
相關(guān)碩士學位論文 前3條
1 曠慶圓;安全信息與事件管理關(guān)鍵技術(shù)研究[D];北京郵電大學;2015年
2 郭俸明;漏洞掃描工具原理與實現(xiàn)[D];中國地質(zhì)大學(北京);2008年
3 金鏡;面向方面的軟件進化研究[D];天津大學;2006年
,本文編號:2212035
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2212035.html