Abstract

This paper firstly briefly analyzes the general design principles and special requirements of a certain type of engineering information security protection system. This paper focuses on the analysis of information security technology prevention system design. This paper is based on modern information technology and fully adopts the latest development and concepts of information security protection technology; The design analysis process makes extensive use of computer, network security, automation, industrial control, and other technologies. The purpose of this paper is to make a certain engineering and weapon equipment information security protection system adapt to the special environment of information security, reliability, and confidentiality. Another purpose is to realize the particularity, advancement, practicability, and expansibility and of a certain type of engineering information security protection system.

Highlights

  • There is a general lack of top-level design and overall planning in the construction of the information security protection system of some kind of engineering in China

  • This paper focuses on network access security, desktop and centralized data management, data storage and backup, information exchange and input or output control, information security audit and other design

  • It is of great significance to the promotion of the actual combat level

Read more

Summary

Introduction

There is a general lack of top-level design and overall planning in the construction of the information security protection system (referred to as system) of some kind of engineering (referred to as engineering) in China. There are great security risks in the information management of engineering and weapons. The design can ensure: a) officers and soldiers have access to the information system with a unique identity and permission; b) the completeness and practicality of the operational space for officers and soldiers; c)the confidentiality and completeness of information storage, disposal and transmission; d)the completeness of hardware, operating platform kernel, service and application software; e) the security of password use and storage; f)the protection capability of the engineering system. The analytical experience and results of this paper can be applied to the design and construction of similar engineering systems. It can be used for reference by similar systems in other industries

General scheme design principles
Demand analysis of overall scheme design
Design and analysis of information security technology protection system
Design and analysis of network access security
Design and analysis of network and application system security access control
Design and analysis of desktop and data centralized security control
Design and analysis of information exchange and input-output security control
Design and analysis of information security audit
Design and analysis of data storage backup
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.