CN107888609A - A kind of information security of computer network system - Google Patents

A kind of information security of computer network system Download PDF

Info

Publication number
CN107888609A
CN107888609A CN201711225467.6A CN201711225467A CN107888609A CN 107888609 A CN107888609 A CN 107888609A CN 201711225467 A CN201711225467 A CN 201711225467A CN 107888609 A CN107888609 A CN 107888609A
Authority
CN
China
Prior art keywords
computer
module
network
hard disk
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711225467.6A
Other languages
Chinese (zh)
Inventor
袁靖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chuzhou Huachen Software Technology Co Ltd
Original Assignee
Chuzhou Huachen Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chuzhou Huachen Software Technology Co Ltd filed Critical Chuzhou Huachen Software Technology Co Ltd
Priority to CN201711225467.6A priority Critical patent/CN107888609A/en
Publication of CN107888609A publication Critical patent/CN107888609A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Abstract

The invention discloses a kind of information security of computer network system,Including central processing unit,Memory module,Management module,Network security module,Communication module and computer-aided equipment,The memory module,Management module,Network security module,Communication module and computer-aided equipment are connected with central processing unit respectively,The memory module includes unencryption hard disk,Encrypt hard disk and network cloud disk,The network security module includes virus protection system,Intruding detection system and remotely access access control,The present apparatus is managed by encrypting hard disk to the significant data of user,Reduce the possibility of loss of data,Situation about arbitrarily being opened by authentication module reduction computer,Virus protection system is used to intercept the virus of routine,Reduce the number that computer is attacked,Intruding detection system is used for the extension for preventing loss.

Description

A kind of information security of computer network system
Technical field
The present invention relates to computer network security technology field, more particularly to a kind of information security of computer network system.
Background technology
Information security of computer network refers to, by using various technologies and control measures, make computer network system normal Operation, so that it is guaranteed that the availability of network data, integrality and confidentiality, for the angle of user, they wish to be related to The information of people's privacy or commercial interest is protected in transmission over networks by confidentiality, integrality and authenticity, and from enterprise Angle for, it is most important be exactly in internal information safety encryption and protection.Present information security of computer network shape Gesture is increasingly severe, and the situation that user data is compromised occurs repeatedly, and information security of computer network seems increasingly severe.
The content of the invention
The invention aims to solve shortcoming present in prior art, and a kind of computer network information proposed Security system.
To achieve these goals, present invention employs following technical scheme:
A kind of information security of computer network system, including central processing unit, memory module, management module, network security module, Communication module and computer-aided equipment, the memory module, management module, network security module, communication module and computer Auxiliary equipment is connected with central processing unit respectively, and the memory module includes unencryption hard disk, encryption hard disk and network cloud disk, The management module includes key generator, cipher controlled device, secret key decryption device, authentication module and remote control module, described Network security module includes virus protection system, intruding detection system and remotely accesses access control, and the communication module includes Wired network adapter, wireless network card and Network Isolation switch.
Preferably, the unencryption hard disk is used to store General System data and other general datas, and encryption hard disk is used for Significant data is stored, and unencryption hard disk and encryption hard disk are mechanical hard disk or solid state hard disc.
Preferably, the key generator, cipher controlled device, secret key decryption device are used to check or managing encrypted hard disk, Authentication module logins computer for user, and authentication module is unlocked by fingerprint device or face identification device.
Preferably, the remote control module is monitored or operated to computer by remote terminal, remote terminal For mobile phone, flat board or computer, remote terminal is connected by internet with computer.
Preferably, the virus protection system is antivirus software, and intruding detection system is used to report computer mode, invaded Include intrusion detection device in detecting system, remotely access the connection shape that access control is used to checking and controlling remote terminal access State.
Preferably, the Network Isolation is switched for long-range network of shutting down computer, when being invaded by computer to based on The network of calculation machine is remotely closed.
Preferably, the network cloud disk is used for the activity log for storing network security module, and network cloud disk passes through interconnection Net is connected with remote control module, can check the activity log of security module at any time by remote control module.
Preferably, the computer-aided equipment includes UPS, IP Camera, keyboard and mouse, and IP Camera leads to Internet is crossed with remote control module to be connected.
The beneficial effects of the invention are as follows:
1st, the present apparatus is managed by encrypting hard disk to the significant data of user, the possibility of loss of data is reduced, by recognizing Card module reduces the situation that computer is arbitrarily opened, and virus protection system is used to intercept the virus of routine, reduces meter The number that calculation machine is attacked, intruding detection system are used for the extension for preventing loss;
2nd, during remote management computer, computer can be monitored by remote terminal by the remote control module or Person operates, the timely processing when there are abnormal conditions, prevents the extension of loss, and remote terminal can be that some portable set Standby, easy to use, IP Camera is observed that the external environment of computer, can be timely when there are abnormal conditions Go to scene and handled;
3rd, the activity log of security module can be checked by cloud disk, for assessing the security performance of computer, is easy to Upgrading to computer security module, while it can be found that some easy ignored intrusion events.
Brief description of the drawings
Fig. 1 is a kind of theory diagram of information security of computer network system proposed by the present invention;
Fig. 2 is a kind of theory diagram of the memory module of information security of computer network system proposed by the present invention;
Fig. 3 is a kind of theory diagram of the communication module of information security of computer network system proposed by the present invention;
Fig. 4 is a kind of theory diagram of the management module of information security of computer network system proposed by the present invention;
Fig. 5 is a kind of theory diagram of the network security module of information security of computer network system proposed by the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.
Reference picture 1-5, a kind of information security of computer network system, including central processing unit, memory module, management mould Block, network security module, communication module and computer-aided equipment, the memory module, management module, network security module, Communication module and computer-aided equipment are connected with central processing unit respectively, and the memory module includes unencryption hard disk, added Close hard disk and network cloud disk, the management module include key generator, cipher controlled device, secret key decryption device, authentication module and Remote control module, the network security module include virus protection system, intruding detection system and remotely access access control, The communication module includes wired network adapter, wireless network card and Network Isolation switch, and the unencryption hard disk is used to store general system Data of uniting and other general datas, encryption hard disk is used to store significant data, and unencryption hard disk and encryption hard disk are hard for machinery Disk or solid state hard disc, the key generator, cipher controlled device, secret key decryption device are used to check or managing encrypted hard disk, Authentication module logins computer for user, and authentication module is unlocked by fingerprint device or face identification device, the long-range control Molding block is monitored or operated to computer by remote terminal, and remote terminal is mobile phone, flat board or computer, remotely Terminal through internet is connected with computer, and the virus protection system is antivirus software, and intruding detection system is used to report Computer mode, intruding detection system is interior to include intrusion detection device, remotely accesses access control and is used to checking and controlling long-range visit Ask the connection status of terminal, the Network Isolation is switched for long-range network of shutting down computer, when being invaded for computer pair The network of computer is remotely closed, and the network cloud disk is used for the activity log for storing network security module, and network cloud Disk is connected by internet with remote control module, can check the active day of security module at any time by remote control module Will, the computer-aided equipment includes UPS, IP Camera, keyboard and mouse, and IP Camera is by internet and far Process control module is connected.
In embodiment 1, during normal use, user, which needs to first pass through authentication module, opens computer, and opening can after computer To be used to check or managing encrypted hard disk by key generator, cipher controlled device, secret key decryption device, facilitate that user's is important Data are managed, and reduce the possibility of loss of data, and virus protection system is used to intercept the virus of routine, invasion inspection Examining system is used to report computer mode, occurs timely to sound a warning to user during abnormal conditions, prevents the expansion of loss Change, the quantity and identity of remote access user can be set by remotely accessing access control, to data further protection, Ke Yitong The activity log that cloud disk checks security module is crossed, for assessing the security performance of computer, is easy to computer security The upgrading of module, while it can be found that some easy ignored intrusion events.
In embodiment 2, during remote management, computer can be carried out by remote terminal by the remote control module Monitoring or operation, the timely processing when there are abnormal conditions, it may be necessary to close Network Isolation switch, prevent the expansion of loss Bigization, remote terminal can be some portable sets, and easy to use, IP Camera is observed that the extraneous ring of computer Border, when there are abnormal conditions, it can timely go to scene and be handled, can also be checked by remote terminal by cloud disk The activity log of security module.
The foregoing is only a preferred embodiment of the present invention, but protection scope of the present invention be not limited thereto, Any one skilled in the art the invention discloses technical scope in, technique according to the invention scheme and its Inventive concept is subject to equivalent substitution or change, should all be included within the scope of the present invention.

Claims (8)

1. a kind of information security of computer network system, including central processing unit, memory module, management module, network security mould Block, communication module and computer-aided equipment, it is characterised in that the memory module, management module, network security module, logical Letter module and computer-aided equipment are connected with central processing unit respectively, and the memory module includes unencryption hard disk, encryption Hard disk and network cloud disk, the management module include key generator, cipher controlled device, secret key decryption device, authentication module and remote Process control module, the network security module include virus protection system, intruding detection system and remotely access access control, institute Stating communication module includes wired network adapter, wireless network card and Network Isolation switch.
A kind of 2. information security of computer network system according to claim 1, it is characterised in that the unencryption hard disk For storing General System data and other general datas, encryption hard disk is used to store significant data, and unencryption hard disk is with adding Close hard disk is mechanical hard disk or solid state hard disc.
A kind of 3. information security of computer network system according to claim 1, it is characterised in that the key generation Device, cipher controlled device, secret key decryption device are used to check or managing encrypted hard disk, authentication module login computer for user, Authentication module is unlocked by fingerprint device or face identification device.
A kind of 4. information security of computer network system according to claim 1, it is characterised in that the remote control mould Block is monitored or operated to computer by remote terminal, and remote terminal is mobile phone, flat board or computer, remote terminal It is connected by internet with computer.
A kind of 5. information security of computer network system according to claim 1, it is characterised in that the antivirus protection system Unite and be used to report computer mode for antivirus software, intruding detection system, include intrusion detection device in intruding detection system, remotely Access controls the connection status for checking and controlling remote terminal access.
6. a kind of information security of computer network system according to claim 1, it is characterised in that the Network Isolation is opened Close for long-range network of shutting down computer, the network of computer is remotely closed when being invaded for computer.
7. a kind of information security of computer network system according to claim 1, it is characterised in that the network cloud disk is used In the activity log of storage network security module, and network cloud disk is connected by internet with remote control module, can be passed through Remote control module checks the activity log of security module at any time.
A kind of 8. information security of computer network system according to claim 1, it is characterised in that the area of computer aided Equipment includes UPS, IP Camera, keyboard and mouse, and IP Camera is connected by internet with remote control module.
CN201711225467.6A 2017-11-29 2017-11-29 A kind of information security of computer network system Pending CN107888609A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711225467.6A CN107888609A (en) 2017-11-29 2017-11-29 A kind of information security of computer network system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711225467.6A CN107888609A (en) 2017-11-29 2017-11-29 A kind of information security of computer network system

Publications (1)

Publication Number Publication Date
CN107888609A true CN107888609A (en) 2018-04-06

Family

ID=61775935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711225467.6A Pending CN107888609A (en) 2017-11-29 2017-11-29 A kind of information security of computer network system

Country Status (1)

Country Link
CN (1) CN107888609A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108521431A (en) * 2018-04-25 2018-09-11 信阳师范学院 A kind of information security of computer network system
CN108667670A (en) * 2018-05-25 2018-10-16 合肥利元杰信息科技有限公司 A kind of computer networking technology on-line maintenance system
CN108810035A (en) * 2018-08-23 2018-11-13 安徽阳露新型建材有限公司 A kind of Network Security Device monitored in real time
CN109117963A (en) * 2018-08-24 2019-01-01 浙江苍润信息科技有限公司 A kind of network platform of making house calls with order distributes system
CN109150900A (en) * 2018-09-18 2019-01-04 温州职业技术学院 A kind of information security of computer network system
CN109359454A (en) * 2018-09-18 2019-02-19 温州职业技术学院 A kind of encryption system for computerized information
CN109582293A (en) * 2018-12-20 2019-04-05 北京弗洛花园文化发展有限公司 Fresh flower post house Intelligent cargo cabinet research and development of software management system
CN109817292A (en) * 2019-02-12 2019-05-28 宁夏医科大学 The measuring method and debugging system of social mentality, group and behavior
CN110263517A (en) * 2019-05-27 2019-09-20 湖南高速铁路职业技术学院 The information safety system of enterprise intelligent equipment
CN112381557A (en) * 2020-12-08 2021-02-19 集商网络科技(上海)有限公司 Information management service system for background
CN112446013A (en) * 2019-08-30 2021-03-05 中移物联网有限公司 Cloud disk management method and system
CN112487383A (en) * 2020-11-17 2021-03-12 重庆第二师范学院 Computer system for ensuring information safety and control method thereof
CN113179259A (en) * 2021-04-21 2021-07-27 深圳无界视觉科技有限责任公司 Multi-person communication terminal control system
CN114338084A (en) * 2021-12-03 2022-04-12 山西三友和智慧信息技术股份有限公司 High-encryption security protection system for computer network
CN114550401A (en) * 2022-02-24 2022-05-27 深圳市奇创想科技有限公司 Intelligent household audio player and control system
CN115499844A (en) * 2022-09-22 2022-12-20 贵州电网有限责任公司 Mobile terminal information safety protection system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430000A (en) * 2015-12-17 2016-03-23 北京华油信通科技有限公司 Cloud computing security management system
CN106603517A (en) * 2016-12-03 2017-04-26 新乡学院 Computer network information security monitoring system
CN206178834U (en) * 2016-10-13 2017-05-17 泰山医学院 Computer network information safety coefficient
CN106936829A (en) * 2017-03-04 2017-07-07 平顶山学院 A kind of security system of computer network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430000A (en) * 2015-12-17 2016-03-23 北京华油信通科技有限公司 Cloud computing security management system
CN206178834U (en) * 2016-10-13 2017-05-17 泰山医学院 Computer network information safety coefficient
CN106603517A (en) * 2016-12-03 2017-04-26 新乡学院 Computer network information security monitoring system
CN106936829A (en) * 2017-03-04 2017-07-07 平顶山学院 A kind of security system of computer network

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108521431A (en) * 2018-04-25 2018-09-11 信阳师范学院 A kind of information security of computer network system
CN108667670A (en) * 2018-05-25 2018-10-16 合肥利元杰信息科技有限公司 A kind of computer networking technology on-line maintenance system
CN108810035A (en) * 2018-08-23 2018-11-13 安徽阳露新型建材有限公司 A kind of Network Security Device monitored in real time
CN109117963A (en) * 2018-08-24 2019-01-01 浙江苍润信息科技有限公司 A kind of network platform of making house calls with order distributes system
CN109150900A (en) * 2018-09-18 2019-01-04 温州职业技术学院 A kind of information security of computer network system
CN109359454A (en) * 2018-09-18 2019-02-19 温州职业技术学院 A kind of encryption system for computerized information
CN109582293A (en) * 2018-12-20 2019-04-05 北京弗洛花园文化发展有限公司 Fresh flower post house Intelligent cargo cabinet research and development of software management system
CN109817292A (en) * 2019-02-12 2019-05-28 宁夏医科大学 The measuring method and debugging system of social mentality, group and behavior
CN110263517A (en) * 2019-05-27 2019-09-20 湖南高速铁路职业技术学院 The information safety system of enterprise intelligent equipment
CN112446013A (en) * 2019-08-30 2021-03-05 中移物联网有限公司 Cloud disk management method and system
CN112487383A (en) * 2020-11-17 2021-03-12 重庆第二师范学院 Computer system for ensuring information safety and control method thereof
CN112487383B (en) * 2020-11-17 2023-08-08 重庆第二师范学院 Computer system for guaranteeing information security and control method thereof
CN112381557A (en) * 2020-12-08 2021-02-19 集商网络科技(上海)有限公司 Information management service system for background
CN113179259A (en) * 2021-04-21 2021-07-27 深圳无界视觉科技有限责任公司 Multi-person communication terminal control system
CN114338084A (en) * 2021-12-03 2022-04-12 山西三友和智慧信息技术股份有限公司 High-encryption security protection system for computer network
CN114550401A (en) * 2022-02-24 2022-05-27 深圳市奇创想科技有限公司 Intelligent household audio player and control system
CN115499844A (en) * 2022-09-22 2022-12-20 贵州电网有限责任公司 Mobile terminal information safety protection system and method
CN115499844B (en) * 2022-09-22 2024-04-30 贵州电网有限责任公司 Mobile terminal information safety protection system and method

Similar Documents

Publication Publication Date Title
CN107888609A (en) A kind of information security of computer network system
CN104871484B (en) The system and method for network firewall for the endpoint hardware auxiliary in security context
US9348985B2 (en) Behavioral fingerprint controlled automatic task determination
CN113032763A (en) Privacy and data protection on intelligent edge devices
CN104851159B (en) A kind of network-type access control system
CN107004080A (en) Environment sensing security token
CN107004074A (en) The technology of enhanced user certification is carried out using advanced sensors monitoring
Conrad et al. Eleventh hour CISSP: study guide
CN107567630A (en) The isolation of trusted input-output apparatus
CN103370717A (en) Always-available embedded theft reaction subsystem
TW201333749A (en) Method of securing a computing device
CN104169940A (en) Method of restricting corporate digital information within corporate boundary
CN102195940A (en) Virtual-machine-technology-based data security input and submission method and system
US20200134180A1 (en) Enhanced protections against adversarial machine learning threats utilizing cryptography and hardware assisted monitoring in accelerators
CN104618353A (en) Computer security network
IL274589B1 (en) Secure red-black air-gapped portable computer
Ikrissi et al. A study of smart campus environment and its security attacks
US20210004482A1 (en) System and method of enhancing security of data in a health care network
CN103546478A (en) Internal and external network secure access method and system
CN102508792A (en) Method for realizing secure access of data in hard disk
CN102667792B (en) For the method and apparatus of the file of the file server of access security
CN103020542B (en) Store the technology of the secret information being used for global data center
Parasher et al. Green Smart Security System
CN105208045A (en) Identity authentication method, equipment and system
CN103902922B (en) A kind of method and system for preventing file from stealing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180406

RJ01 Rejection of invention patent application after publication