Abstract
This paper firstly briefly analyzes the general design principles and special requirements of a certain type of engineering information security protection system. This paper focuses on the analysis of information security technology prevention system design. This paper is based on modern information technology and fully adopts the latest development and concepts of information security protection technology; The design analysis process makes extensive use of computer, network security, automation, industrial control, and other technologies. The purpose of this paper is to make a certain engineering and weapon equipment information security protection system adapt to the special environment of information security, reliability, and confidentiality. Another purpose is to realize the particularity, advancement, practicability, and expansibility and of a certain type of engineering information security protection system.
Highlights
There is a general lack of top-level design and overall planning in the construction of the information security protection system of some kind of engineering in China
This paper focuses on network access security, desktop and centralized data management, data storage and backup, information exchange and input or output control, information security audit and other design
It is of great significance to the promotion of the actual combat level
Summary
There is a general lack of top-level design and overall planning in the construction of the information security protection system (referred to as system) of some kind of engineering (referred to as engineering) in China. There are great security risks in the information management of engineering and weapons. The design can ensure: a) officers and soldiers have access to the information system with a unique identity and permission; b) the completeness and practicality of the operational space for officers and soldiers; c)the confidentiality and completeness of information storage, disposal and transmission; d)the completeness of hardware, operating platform kernel, service and application software; e) the security of password use and storage; f)the protection capability of the engineering system. The analytical experience and results of this paper can be applied to the design and construction of similar engineering systems. It can be used for reference by similar systems in other industries
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.