Dissertation > Excellent graduate degree dissertation topics show

The tobacco fund management network security

Author: YangZhengPeng
Tutor: WuZuo;AiChangWen
School: Kunming University of Science and Technology
Course: Computer technology
Keywords: the security of network the Capital Managerial Center Virtual Private Network(VPN) database secure technology assessment secure schema
CLC: TP393.08
Type: Master's thesis
Year: 2007
Downloads: 78
Quote: 0
Read: Download Dissertation

Abstract


The developmental process of tobacco industry has run from Extensive management to Intensive management. The establishment of Capital Centralized Management system is an important measure for Intensive management of Yunnan Provincial Tobacco Company, by using the way of two route of "income-payout" to manage. In the process of software design, we use the B/S model, which deals with many members’ units such as the banks, telecommunications, etc. Because the capital current of Yunnan tobacco is very large and the capital flows frequently, the request to capital security is urgent and require strict secure schema of network management.According to above case, this article analyses the circumstance of network security, the means of network attack. Because of the popular anti-viruses technology at the present, data cryptogram and compression technology, VPN technology, firewall technology, database secure technology, we build the network secure technology of capital managerial center of Yunnan Provincial Tobacco, which include the secure schema of capital managerial center, bank-edge, client-edge, and present the execution means of assessment.1. Capital management center. By using the secure technology of network entity, the defensive technology of database, the technology of hoststandby, firewall’s technology, VPN’s technology, it can ensure the data security and do not be attacked by network.2. From capital managerial center to bank-edge. In the face of the transmission of data network, using high-intensity SSL of secure communicating encrypt measures can protect the users’ information which can’t be thrieved or modified; In the face of status accreditation, handling the most secure Public Key security system which is built through using 128-bit Asymmetric Algorithm, can effectively authenticate the user’s status, identify legal user’s status, and check the user’s digital ID. At the same time, client certificates use supporting symmetry RSA, and store means is intellect IC card of CPU coprocessor which greatly improve the security of net banks. 3. From the Capital managerial center to user-edge. In the network frame, instating various firewall and a secure service agency, can prevent illegal incursion, and assure the security of entire system; handling VPN technology can build enterprise’s network which is not limited by district but controlled and managed by the united strategy of enterprise. Firewall IP and MAC address can bind and control the user’s bandwidth which can protect IP address of central machine in inter network to be not thieved and can prevent user abuse bandwidth; using firewall system of web version can defend each system and knob in network.4. Client-edge. Using code visiting technology can prevent illegal user’s visiting and meantime software of anti-viruses can prevent addicted client disturbing system. Download operation system patch in time, can improve the strong capacity of system.According above conception, now it is enforced in the network security frame of Yunnan Province Tobacco Company. Initiative network defensive system can defend viruses incursion and illegal user’s attack, and assure the capital managerial center system running normally.

Related Dissertations

  1. Research on the Correlation between Formative Assessment in College EFL Class and Students’ Learning Attitude,H319.3
  2. Implementation Study of evaluation method of the high school IT courses,G633.67
  3. Research on the Impact Analysis of Network Security Incidents Based on Simulation,TP393.08
  4. Effect of Soil Erosion on Soil Quality in the Cultivated Slope Land on the Loess Plateau, China,S157.1
  5. Municipal tourism land use planning environmental impact assessment,X820.3
  6. Lijiang River,RS and GIS - based Soil Erosion Research,S157
  7. An Action Research on the Influence of Classroom Interaction on High School Students’ English Speaking Proficiency,G633.41
  8. An Action Research on the Enhancement of Junior Students’ English Core Word Productive Competence Through Formative Assessment,G633.41
  9. Comprehensive Quality Assessment of College Students,G645.5
  10. Risk Analysis and Mitigation Experiment of Heavy Metal Pollution in Croplands in Vicinity of Pollution Sources,X820.4
  11. Health Risk Assessment of a Brownfield Contaminated by Volatile Chlorinated Hydrocarbons and Study on Screening of Remediation Technique,X820.4
  12. Health-based and Ecological Risk Assessment of Contaminated Sites,X820.4
  13. Study on the Quantified Model of Public Participation in Highway Environmental Impact Assessment,U41
  14. The Study on Quality Regionalization of Characteristic Flue-cured Tobacco in Lincang,S572
  15. Research on Feed Safety of Transgenic Rice in Broiler,S831.5
  16. Research on the Human Health Damage Assessment Model of Building during the Life Cycle,R131
  17. Sagitta Morephology, Distribution, Biology and Stock Assessment of Four Prlagic Species in the Mouth of Beibu Gulf,S932.4
  18. A Research on Mechanism of Civil Servant Performance Assessment in China,D630.3
  19. The Evaluation and Forecasting Research on Uncertainty Systems Method of Student Achievement,G642.4
  20. A Study on the Predictive Model of Health Assessment in Li River, Guiling, Guangxi,X826
  21. Research on Farmland Ecosystem Health Assessment Method of Township in Mid-Jiangsu Region,X826

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile