CN107888609A - A kind of information security of computer network system - Google Patents
A kind of information security of computer network system Download PDFInfo
- Publication number
- CN107888609A CN107888609A CN201711225467.6A CN201711225467A CN107888609A CN 107888609 A CN107888609 A CN 107888609A CN 201711225467 A CN201711225467 A CN 201711225467A CN 107888609 A CN107888609 A CN 107888609A
- Authority
- CN
- China
- Prior art keywords
- computer
- module
- network
- hard disk
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Abstract
The invention discloses a kind of information security of computer network system,Including central processing unit,Memory module,Management module,Network security module,Communication module and computer-aided equipment,The memory module,Management module,Network security module,Communication module and computer-aided equipment are connected with central processing unit respectively,The memory module includes unencryption hard disk,Encrypt hard disk and network cloud disk,The network security module includes virus protection system,Intruding detection system and remotely access access control,The present apparatus is managed by encrypting hard disk to the significant data of user,Reduce the possibility of loss of data,Situation about arbitrarily being opened by authentication module reduction computer,Virus protection system is used to intercept the virus of routine,Reduce the number that computer is attacked,Intruding detection system is used for the extension for preventing loss.
Description
Technical field
The present invention relates to computer network security technology field, more particularly to a kind of information security of computer network system.
Background technology
Information security of computer network refers to, by using various technologies and control measures, make computer network system normal
Operation, so that it is guaranteed that the availability of network data, integrality and confidentiality, for the angle of user, they wish to be related to
The information of people's privacy or commercial interest is protected in transmission over networks by confidentiality, integrality and authenticity, and from enterprise
Angle for, it is most important be exactly in internal information safety encryption and protection.Present information security of computer network shape
Gesture is increasingly severe, and the situation that user data is compromised occurs repeatedly, and information security of computer network seems increasingly severe.
The content of the invention
The invention aims to solve shortcoming present in prior art, and a kind of computer network information proposed
Security system.
To achieve these goals, present invention employs following technical scheme:
A kind of information security of computer network system, including central processing unit, memory module, management module, network security module,
Communication module and computer-aided equipment, the memory module, management module, network security module, communication module and computer
Auxiliary equipment is connected with central processing unit respectively, and the memory module includes unencryption hard disk, encryption hard disk and network cloud disk,
The management module includes key generator, cipher controlled device, secret key decryption device, authentication module and remote control module, described
Network security module includes virus protection system, intruding detection system and remotely accesses access control, and the communication module includes
Wired network adapter, wireless network card and Network Isolation switch.
Preferably, the unencryption hard disk is used to store General System data and other general datas, and encryption hard disk is used for
Significant data is stored, and unencryption hard disk and encryption hard disk are mechanical hard disk or solid state hard disc.
Preferably, the key generator, cipher controlled device, secret key decryption device are used to check or managing encrypted hard disk,
Authentication module logins computer for user, and authentication module is unlocked by fingerprint device or face identification device.
Preferably, the remote control module is monitored or operated to computer by remote terminal, remote terminal
For mobile phone, flat board or computer, remote terminal is connected by internet with computer.
Preferably, the virus protection system is antivirus software, and intruding detection system is used to report computer mode, invaded
Include intrusion detection device in detecting system, remotely access the connection shape that access control is used to checking and controlling remote terminal access
State.
Preferably, the Network Isolation is switched for long-range network of shutting down computer, when being invaded by computer to based on
The network of calculation machine is remotely closed.
Preferably, the network cloud disk is used for the activity log for storing network security module, and network cloud disk passes through interconnection
Net is connected with remote control module, can check the activity log of security module at any time by remote control module.
Preferably, the computer-aided equipment includes UPS, IP Camera, keyboard and mouse, and IP Camera leads to
Internet is crossed with remote control module to be connected.
The beneficial effects of the invention are as follows:
1st, the present apparatus is managed by encrypting hard disk to the significant data of user, the possibility of loss of data is reduced, by recognizing
Card module reduces the situation that computer is arbitrarily opened, and virus protection system is used to intercept the virus of routine, reduces meter
The number that calculation machine is attacked, intruding detection system are used for the extension for preventing loss;
2nd, during remote management computer, computer can be monitored by remote terminal by the remote control module or
Person operates, the timely processing when there are abnormal conditions, prevents the extension of loss, and remote terminal can be that some portable set
Standby, easy to use, IP Camera is observed that the external environment of computer, can be timely when there are abnormal conditions
Go to scene and handled;
3rd, the activity log of security module can be checked by cloud disk, for assessing the security performance of computer, is easy to
Upgrading to computer security module, while it can be found that some easy ignored intrusion events.
Brief description of the drawings
Fig. 1 is a kind of theory diagram of information security of computer network system proposed by the present invention;
Fig. 2 is a kind of theory diagram of the memory module of information security of computer network system proposed by the present invention;
Fig. 3 is a kind of theory diagram of the communication module of information security of computer network system proposed by the present invention;
Fig. 4 is a kind of theory diagram of the management module of information security of computer network system proposed by the present invention;
Fig. 5 is a kind of theory diagram of the network security module of information security of computer network system proposed by the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.
Reference picture 1-5, a kind of information security of computer network system, including central processing unit, memory module, management mould
Block, network security module, communication module and computer-aided equipment, the memory module, management module, network security module,
Communication module and computer-aided equipment are connected with central processing unit respectively, and the memory module includes unencryption hard disk, added
Close hard disk and network cloud disk, the management module include key generator, cipher controlled device, secret key decryption device, authentication module and
Remote control module, the network security module include virus protection system, intruding detection system and remotely access access control,
The communication module includes wired network adapter, wireless network card and Network Isolation switch, and the unencryption hard disk is used to store general system
Data of uniting and other general datas, encryption hard disk is used to store significant data, and unencryption hard disk and encryption hard disk are hard for machinery
Disk or solid state hard disc, the key generator, cipher controlled device, secret key decryption device are used to check or managing encrypted hard disk,
Authentication module logins computer for user, and authentication module is unlocked by fingerprint device or face identification device, the long-range control
Molding block is monitored or operated to computer by remote terminal, and remote terminal is mobile phone, flat board or computer, remotely
Terminal through internet is connected with computer, and the virus protection system is antivirus software, and intruding detection system is used to report
Computer mode, intruding detection system is interior to include intrusion detection device, remotely accesses access control and is used to checking and controlling long-range visit
Ask the connection status of terminal, the Network Isolation is switched for long-range network of shutting down computer, when being invaded for computer pair
The network of computer is remotely closed, and the network cloud disk is used for the activity log for storing network security module, and network cloud
Disk is connected by internet with remote control module, can check the active day of security module at any time by remote control module
Will, the computer-aided equipment includes UPS, IP Camera, keyboard and mouse, and IP Camera is by internet and far
Process control module is connected.
In embodiment 1, during normal use, user, which needs to first pass through authentication module, opens computer, and opening can after computer
To be used to check or managing encrypted hard disk by key generator, cipher controlled device, secret key decryption device, facilitate that user's is important
Data are managed, and reduce the possibility of loss of data, and virus protection system is used to intercept the virus of routine, invasion inspection
Examining system is used to report computer mode, occurs timely to sound a warning to user during abnormal conditions, prevents the expansion of loss
Change, the quantity and identity of remote access user can be set by remotely accessing access control, to data further protection, Ke Yitong
The activity log that cloud disk checks security module is crossed, for assessing the security performance of computer, is easy to computer security
The upgrading of module, while it can be found that some easy ignored intrusion events.
In embodiment 2, during remote management, computer can be carried out by remote terminal by the remote control module
Monitoring or operation, the timely processing when there are abnormal conditions, it may be necessary to close Network Isolation switch, prevent the expansion of loss
Bigization, remote terminal can be some portable sets, and easy to use, IP Camera is observed that the extraneous ring of computer
Border, when there are abnormal conditions, it can timely go to scene and be handled, can also be checked by remote terminal by cloud disk
The activity log of security module.
The foregoing is only a preferred embodiment of the present invention, but protection scope of the present invention be not limited thereto,
Any one skilled in the art the invention discloses technical scope in, technique according to the invention scheme and its
Inventive concept is subject to equivalent substitution or change, should all be included within the scope of the present invention.
Claims (8)
1. a kind of information security of computer network system, including central processing unit, memory module, management module, network security mould
Block, communication module and computer-aided equipment, it is characterised in that the memory module, management module, network security module, logical
Letter module and computer-aided equipment are connected with central processing unit respectively, and the memory module includes unencryption hard disk, encryption
Hard disk and network cloud disk, the management module include key generator, cipher controlled device, secret key decryption device, authentication module and remote
Process control module, the network security module include virus protection system, intruding detection system and remotely access access control, institute
Stating communication module includes wired network adapter, wireless network card and Network Isolation switch.
A kind of 2. information security of computer network system according to claim 1, it is characterised in that the unencryption hard disk
For storing General System data and other general datas, encryption hard disk is used to store significant data, and unencryption hard disk is with adding
Close hard disk is mechanical hard disk or solid state hard disc.
A kind of 3. information security of computer network system according to claim 1, it is characterised in that the key generation
Device, cipher controlled device, secret key decryption device are used to check or managing encrypted hard disk, authentication module login computer for user,
Authentication module is unlocked by fingerprint device or face identification device.
A kind of 4. information security of computer network system according to claim 1, it is characterised in that the remote control mould
Block is monitored or operated to computer by remote terminal, and remote terminal is mobile phone, flat board or computer, remote terminal
It is connected by internet with computer.
A kind of 5. information security of computer network system according to claim 1, it is characterised in that the antivirus protection system
Unite and be used to report computer mode for antivirus software, intruding detection system, include intrusion detection device in intruding detection system, remotely
Access controls the connection status for checking and controlling remote terminal access.
6. a kind of information security of computer network system according to claim 1, it is characterised in that the Network Isolation is opened
Close for long-range network of shutting down computer, the network of computer is remotely closed when being invaded for computer.
7. a kind of information security of computer network system according to claim 1, it is characterised in that the network cloud disk is used
In the activity log of storage network security module, and network cloud disk is connected by internet with remote control module, can be passed through
Remote control module checks the activity log of security module at any time.
A kind of 8. information security of computer network system according to claim 1, it is characterised in that the area of computer aided
Equipment includes UPS, IP Camera, keyboard and mouse, and IP Camera is connected by internet with remote control module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711225467.6A CN107888609A (en) | 2017-11-29 | 2017-11-29 | A kind of information security of computer network system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711225467.6A CN107888609A (en) | 2017-11-29 | 2017-11-29 | A kind of information security of computer network system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107888609A true CN107888609A (en) | 2018-04-06 |
Family
ID=61775935
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711225467.6A Pending CN107888609A (en) | 2017-11-29 | 2017-11-29 | A kind of information security of computer network system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107888609A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108521431A (en) * | 2018-04-25 | 2018-09-11 | 信阳师范学院 | A kind of information security of computer network system |
CN108667670A (en) * | 2018-05-25 | 2018-10-16 | 合肥利元杰信息科技有限公司 | A kind of computer networking technology on-line maintenance system |
CN108810035A (en) * | 2018-08-23 | 2018-11-13 | 安徽阳露新型建材有限公司 | A kind of Network Security Device monitored in real time |
CN109117963A (en) * | 2018-08-24 | 2019-01-01 | 浙江苍润信息科技有限公司 | A kind of network platform of making house calls with order distributes system |
CN109150900A (en) * | 2018-09-18 | 2019-01-04 | 温州职业技术学院 | A kind of information security of computer network system |
CN109359454A (en) * | 2018-09-18 | 2019-02-19 | 温州职业技术学院 | A kind of encryption system for computerized information |
CN109582293A (en) * | 2018-12-20 | 2019-04-05 | 北京弗洛花园文化发展有限公司 | Fresh flower post house Intelligent cargo cabinet research and development of software management system |
CN109817292A (en) * | 2019-02-12 | 2019-05-28 | 宁夏医科大学 | The measuring method and debugging system of social mentality, group and behavior |
CN110263517A (en) * | 2019-05-27 | 2019-09-20 | 湖南高速铁路职业技术学院 | The information safety system of enterprise intelligent equipment |
CN112381557A (en) * | 2020-12-08 | 2021-02-19 | 集商网络科技(上海)有限公司 | Information management service system for background |
CN112446013A (en) * | 2019-08-30 | 2021-03-05 | 中移物联网有限公司 | Cloud disk management method and system |
CN112487383A (en) * | 2020-11-17 | 2021-03-12 | 重庆第二师范学院 | Computer system for ensuring information safety and control method thereof |
CN113179259A (en) * | 2021-04-21 | 2021-07-27 | 深圳无界视觉科技有限责任公司 | Multi-person communication terminal control system |
CN114338084A (en) * | 2021-12-03 | 2022-04-12 | 山西三友和智慧信息技术股份有限公司 | High-encryption security protection system for computer network |
CN114550401A (en) * | 2022-02-24 | 2022-05-27 | 深圳市奇创想科技有限公司 | Intelligent household audio player and control system |
CN115499844A (en) * | 2022-09-22 | 2022-12-20 | 贵州电网有限责任公司 | Mobile terminal information safety protection system and method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105430000A (en) * | 2015-12-17 | 2016-03-23 | 北京华油信通科技有限公司 | Cloud computing security management system |
CN106603517A (en) * | 2016-12-03 | 2017-04-26 | 新乡学院 | Computer network information security monitoring system |
CN206178834U (en) * | 2016-10-13 | 2017-05-17 | 泰山医学院 | Computer network information safety coefficient |
CN106936829A (en) * | 2017-03-04 | 2017-07-07 | 平顶山学院 | A kind of security system of computer network |
-
2017
- 2017-11-29 CN CN201711225467.6A patent/CN107888609A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105430000A (en) * | 2015-12-17 | 2016-03-23 | 北京华油信通科技有限公司 | Cloud computing security management system |
CN206178834U (en) * | 2016-10-13 | 2017-05-17 | 泰山医学院 | Computer network information safety coefficient |
CN106603517A (en) * | 2016-12-03 | 2017-04-26 | 新乡学院 | Computer network information security monitoring system |
CN106936829A (en) * | 2017-03-04 | 2017-07-07 | 平顶山学院 | A kind of security system of computer network |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108521431A (en) * | 2018-04-25 | 2018-09-11 | 信阳师范学院 | A kind of information security of computer network system |
CN108667670A (en) * | 2018-05-25 | 2018-10-16 | 合肥利元杰信息科技有限公司 | A kind of computer networking technology on-line maintenance system |
CN108810035A (en) * | 2018-08-23 | 2018-11-13 | 安徽阳露新型建材有限公司 | A kind of Network Security Device monitored in real time |
CN109117963A (en) * | 2018-08-24 | 2019-01-01 | 浙江苍润信息科技有限公司 | A kind of network platform of making house calls with order distributes system |
CN109150900A (en) * | 2018-09-18 | 2019-01-04 | 温州职业技术学院 | A kind of information security of computer network system |
CN109359454A (en) * | 2018-09-18 | 2019-02-19 | 温州职业技术学院 | A kind of encryption system for computerized information |
CN109582293A (en) * | 2018-12-20 | 2019-04-05 | 北京弗洛花园文化发展有限公司 | Fresh flower post house Intelligent cargo cabinet research and development of software management system |
CN109817292A (en) * | 2019-02-12 | 2019-05-28 | 宁夏医科大学 | The measuring method and debugging system of social mentality, group and behavior |
CN110263517A (en) * | 2019-05-27 | 2019-09-20 | 湖南高速铁路职业技术学院 | The information safety system of enterprise intelligent equipment |
CN112446013A (en) * | 2019-08-30 | 2021-03-05 | 中移物联网有限公司 | Cloud disk management method and system |
CN112487383A (en) * | 2020-11-17 | 2021-03-12 | 重庆第二师范学院 | Computer system for ensuring information safety and control method thereof |
CN112487383B (en) * | 2020-11-17 | 2023-08-08 | 重庆第二师范学院 | Computer system for guaranteeing information security and control method thereof |
CN112381557A (en) * | 2020-12-08 | 2021-02-19 | 集商网络科技(上海)有限公司 | Information management service system for background |
CN113179259A (en) * | 2021-04-21 | 2021-07-27 | 深圳无界视觉科技有限责任公司 | Multi-person communication terminal control system |
CN114338084A (en) * | 2021-12-03 | 2022-04-12 | 山西三友和智慧信息技术股份有限公司 | High-encryption security protection system for computer network |
CN114550401A (en) * | 2022-02-24 | 2022-05-27 | 深圳市奇创想科技有限公司 | Intelligent household audio player and control system |
CN115499844A (en) * | 2022-09-22 | 2022-12-20 | 贵州电网有限责任公司 | Mobile terminal information safety protection system and method |
CN115499844B (en) * | 2022-09-22 | 2024-04-30 | 贵州电网有限责任公司 | Mobile terminal information safety protection system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107888609A (en) | A kind of information security of computer network system | |
CN104871484B (en) | The system and method for network firewall for the endpoint hardware auxiliary in security context | |
US9348985B2 (en) | Behavioral fingerprint controlled automatic task determination | |
CN113032763A (en) | Privacy and data protection on intelligent edge devices | |
CN104851159B (en) | A kind of network-type access control system | |
CN107004080A (en) | Environment sensing security token | |
CN107004074A (en) | The technology of enhanced user certification is carried out using advanced sensors monitoring | |
Conrad et al. | Eleventh hour CISSP: study guide | |
CN107567630A (en) | The isolation of trusted input-output apparatus | |
CN103370717A (en) | Always-available embedded theft reaction subsystem | |
TW201333749A (en) | Method of securing a computing device | |
CN104169940A (en) | Method of restricting corporate digital information within corporate boundary | |
CN102195940A (en) | Virtual-machine-technology-based data security input and submission method and system | |
US20200134180A1 (en) | Enhanced protections against adversarial machine learning threats utilizing cryptography and hardware assisted monitoring in accelerators | |
CN104618353A (en) | Computer security network | |
IL274589B1 (en) | Secure red-black air-gapped portable computer | |
Ikrissi et al. | A study of smart campus environment and its security attacks | |
US20210004482A1 (en) | System and method of enhancing security of data in a health care network | |
CN103546478A (en) | Internal and external network secure access method and system | |
CN102508792A (en) | Method for realizing secure access of data in hard disk | |
CN102667792B (en) | For the method and apparatus of the file of the file server of access security | |
CN103020542B (en) | Store the technology of the secret information being used for global data center | |
Parasher et al. | Green Smart Security System | |
CN105208045A (en) | Identity authentication method, equipment and system | |
CN103902922B (en) | A kind of method and system for preventing file from stealing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180406 |
|
RJ01 | Rejection of invention patent application after publication |