基于基線化管理的計算機配置核查系統(tǒng)的設計與實現(xiàn)
發(fā)布時間:2018-09-07 18:35
【摘要】:計算機終端既是網絡行為的起點,也是各類攻擊的源頭,隨著網絡環(huán)境的愈發(fā)復雜,安全形勢的愈發(fā)嚴峻,保障計算機終端能夠安全地可靠地運轉,是政府以及產業(yè)界長期關注的重點。網關、防火墻和VPN等技術已無法有效地保障網絡的安全,這使得人們不得不打破傳統(tǒng)的安全邊界,思考一種新的手段來提升計算機終端的安全性。本論文源自國家標準的研制課題,該課題主要研究符合我國信息系統(tǒng)安全保護要求的政務終端安全核心配置(China Government Desktop Core Configuration,簡稱CGDCC)。通過深入研究國內外核心配置的研究成果,并結合政務計算機系統(tǒng)管理的業(yè)務需要,本文設計并實現(xiàn)了一套基于基線化管理的計算機配置核查系統(tǒng)。利用此系統(tǒng)對全網計算機進行統(tǒng)一自動化部署基線,對操作系統(tǒng)中的核心配置項進行統(tǒng)一的參數設置,并對這些核心配置項進行實時的監(jiān)測。本文從研究和制定基線所涉及到的核心配置技術和原理入手,將計算機終端的安全要求轉變?yōu)椴僮飨到y(tǒng)可以識別的語言,并生成計算機配置核查系統(tǒng)可以利用的基線包。然后基于核心配置原理進行設計并實現(xiàn)了基于計算機配置核查系統(tǒng)。最后在真實環(huán)境中對系統(tǒng)進行了部署和測試,并展示了系統(tǒng)的實際應用效果。通過研究并設計實現(xiàn)計算機配置核查系統(tǒng),實現(xiàn)對全網的計算機終端配置統(tǒng)一的安全策略和實時進行安全狀態(tài)監(jiān)測等服務,能夠有效提高計算機終端的安全防護水平以及提升系統(tǒng)的運行效率。
[Abstract]:Computer terminal is not only the starting point of network behavior, but also the source of all kinds of attacks. As the network environment becomes more complex and the security situation becomes more serious, it is the focus of government and industry to ensure that computer terminal can operate safely and reliably. This paper originates from the national standard research project, which mainly studies the core configuration of government terminal security (China Government Desktop Core Configuration), which meets the requirements of information system security protection in China. N, CGDCC for short). Through in-depth study of the research results of core configuration at home and abroad, and combined with the business needs of government computer system management, this paper designs and implements a computer configuration verification system based on baseline management. Configuration items are uniformly set up and real-time monitored. This paper begins with the research and development of the core configuration techniques and principles involved in the baseline, transforms the security requirements of computer terminals into a language recognizable by the operating system, and generates the baseline available to the computer configuration verification system. Finally, the system is deployed and tested in the real environment, and the actual application effect of the system is shown. Through the research and design of the computer configuration verification system, the unified security of the computer terminal configuration of the whole network is realized. Strategies and real-time security status monitoring services can effectively improve the level of security protection of computer terminals and improve the operational efficiency of the system.
【學位授予單位】:中國科學院大學(中國科學院工程管理與信息技術學院)
【學位級別】:碩士
【學位授予年份】:2017
【分類號】:TP309;TP311.52
本文編號:2229091
[Abstract]:Computer terminal is not only the starting point of network behavior, but also the source of all kinds of attacks. As the network environment becomes more complex and the security situation becomes more serious, it is the focus of government and industry to ensure that computer terminal can operate safely and reliably. This paper originates from the national standard research project, which mainly studies the core configuration of government terminal security (China Government Desktop Core Configuration), which meets the requirements of information system security protection in China. N, CGDCC for short). Through in-depth study of the research results of core configuration at home and abroad, and combined with the business needs of government computer system management, this paper designs and implements a computer configuration verification system based on baseline management. Configuration items are uniformly set up and real-time monitored. This paper begins with the research and development of the core configuration techniques and principles involved in the baseline, transforms the security requirements of computer terminals into a language recognizable by the operating system, and generates the baseline available to the computer configuration verification system. Finally, the system is deployed and tested in the real environment, and the actual application effect of the system is shown. Through the research and design of the computer configuration verification system, the unified security of the computer terminal configuration of the whole network is realized. Strategies and real-time security status monitoring services can effectively improve the level of security protection of computer terminals and improve the operational efficiency of the system.
【學位授予單位】:中國科學院大學(中國科學院工程管理與信息技術學院)
【學位級別】:碩士
【學位授予年份】:2017
【分類號】:TP309;TP311.52
【參考文獻】
相關期刊論文 前10條
1 劉蓓;許濤;李新友;王嘯天;周欣;;政務計算機終端核心配置標準研究[J];保密科學技術;2014年01期
2 宋杰;;基于組策略編輯器設置的計算機系統(tǒng)攻擊防范技術[J];計算機光盤軟件與應用;2013年23期
3 諶志華;;安全基線管理在企業(yè)中的應用[J];計算機安全;2013年03期
4 劉蘭;朱程榮;;政務終端安全基線管理系統(tǒng)的設計與實現(xiàn)[J];計算機與現(xiàn)代化;2013年02期
5 劉帥;劉蓓;支朝朋;;政務終端安全配置關鍵技術[J];保密科學技術;2011年04期
6 許濤;吳亞非;劉蓓;李新友;;我國政務終端安全桌面核心配置標準研究[J];計算機安全;2010年11期
7 吳志軍;楊義先;;信息安全保障評價指標體系的研究[J];計算機科學;2010年07期
8 姜聰;;Windows組策略在網絡管理中的應用[J];計算機與網絡;2010年Z1期
9 朱寬;;政務內網終端安全的系統(tǒng)設計與實現(xiàn)[J];信息網絡安全;2010年02期
10 呂瑞霞;賀春林;;關于Windows下組策略管理的討論[J];電腦知識與技術;2008年31期
,本文編號:2229091
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/2229091.html
最近更新
教材專著