CN106203175A - Government affairs information defense controls method - Google Patents
Government affairs information defense controls method Download PDFInfo
- Publication number
- CN106203175A CN106203175A CN201610604221.9A CN201610604221A CN106203175A CN 106203175 A CN106203175 A CN 106203175A CN 201610604221 A CN201610604221 A CN 201610604221A CN 106203175 A CN106203175 A CN 106203175A
- Authority
- CN
- China
- Prior art keywords
- information
- file
- government affairs
- pseudo
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a kind of government affairs information defense controls method, pseudo-file preventing mechanism is used to generate the pseudo-file corresponding with government affairs information, management personnel for government affairs information management system, it can access known government affairs information by cloud server end, and Migrant women cannot judge real government affairs information and pseudo-file, when pseudo-file is once accessed, can realize reporting to the police and evidence obtaining, thus improve the safety of government affairs information.
Description
Technical field
The present invention relates to the management domain of government affairs information, specifically a kind of government affairs information defense controls method.
Background technology
Government affairs information is an important class of information, is to reflect government affairs work and the feelings of correlate thereof in state affairs
The general name of report, situation, data, data, chart, written material and audio-video materials etc..Government affairs information should meet three bars simultaneously
Part, one is the information grasped by government bodies, refers to government bodies legal generations, gathers and integrate;Two is with economical, social
Managing the information relevant with public service, three is the content reflected by specific support.
In government affairs information management system, government affairs information is the most important, needs to carry out a certain degree of secrecy processing, if
Do not carry out if the government affairs information of secrecy processing is transmitted on cloud service platform and processes, it is likely that government affairs can be caused to believe
The leakage of breath so that cannot effectively ensure the safety of government affairs information.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of government affairs information defense controls method, introduces pseudo-file protection machine
System, thus improve the safety of government affairs information.
The technical scheme is that
Government affairs information defense controls method, includes following steps:
(1), the government affairs information in client-access disk space generate the puppet that comprise deceptive information corresponding with government affairs information
File, is then transferred to monitor and report to the police clothes by file monitoring with evidence obtaining platform by the information indicating government affairs information and pseudo-file
Business device stores;
(2), when cloud server end has user to access pseudo-file corresponding to government affairs information in disk space, file monitoring and evidence obtaining
Platform monitors government affairs information and the access situation of pseudo-file, and the access information then obtained mails to monitoring and Alarm Server,
Monitoring and the operational access information in Alarm Server analysis system, once finding that pseudo-file is accessed, monitoring and alert service
Device realizes warning function, notifies that manager investigates, and simultaneously monitors and with Alarm Server, pseudo-file is accessed information and be transferred to file
Monitoring and evidence obtaining platform, file monitoring collects disk space by the information of intrusion behavior with evidence obtaining platform.
Described file monitoring includes file monitoring module, communication module and evidence obtaining module with evidence obtaining platform, described
File monitoring module and evidence obtaining module are connected with communication module respectively;The described government affairs information in client-access disk space
And generate the pseudo-file that comprise deceptive information corresponding with government affairs information, then the information indicating government affairs information and pseudo-file is depended on
Secondary by file monitoring module, communication module be transferred to monitor and Alarm Server store;When cloud server end has user
During the pseudo-file that in access disk space, government affairs information is corresponding, file monitoring module monitors government affairs information and the access feelings of pseudo-file
Condition, the access information then obtained mails to, to monitoring and Alarm Server, monitor and Alarm Server analysis by communication module
Operational access information in system, once finding that pseudo-file is accessed, monitoring and Alarm Server realizes warning function, notice pipe
Reason person investigates, and simultaneously monitors and with Alarm Server, pseudo-file accesses information and be transferred to, by communication module, module of collecting evidence, collects evidence
About the information of intrusion behavior in module collection system.
The information of described intrusion behavior includes invasion time, invasion IP address and the pseudo-file information of access.
Operational access information in described supervision and Alarm Server analysis system, when pseudo-file is not accessed, monitors
Carry out storing record to access information with Alarm Server.
Advantages of the present invention:
The present invention uses pseudo-file preventing mechanism to generate the pseudo-file corresponding with government affairs information, for government affairs information management system
Management personnel, it can access known government affairs information by cloud server end, and Migrant women cannot judge real government affairs
Information and pseudo-file, when pseudo-file is once accessed, can realize reporting to the police and evidence obtaining, thus the safety that improve government affairs information is prevented
Protecting property.
Accompanying drawing explanation
Fig. 1 is the theory diagram of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise
Embodiment, broadly falls into the scope of protection of the invention.
Government affairs information defense controls method, includes following steps:
(1), the government affairs information in client-access disk space generate the puppet that comprise deceptive information corresponding with government affairs information
File, then passes sequentially through the file monitoring module of file monitoring and evidence obtaining platform by the information indicating government affairs information and pseudo-file
It is transferred to monitor with communication module and stores with Alarm Server;
(2), when cloud server end has user to access pseudo-file corresponding to government affairs information in disk space, file monitoring and evidence obtaining
The file monitoring module monitors government affairs information of platform and the access situation of pseudo-file, the access information then obtained is supervised by file
Depending on mailing to, to monitoring and Alarm Server, monitor and the operation in Alarm Server analysis system with the communication module of evidence obtaining platform
Access information, once finding that pseudo-file is accessed, monitoring and Alarm Server realizes warning function, notifying that manager investigates, with
Time monitor and Alarm Server pseudo-file is accessed information by file monitoring with collect evidence platform communication module be transferred to file
Monitoring and the evidence obtaining module of evidence obtaining platform, the evidence obtaining module collection disk space of file monitoring and evidence obtaining platform is by intrusion behavior
Information (invasion time, invasion IP address and the pseudo-file information of access);When pseudo-file is not accessed, monitor and alert service
Access information is carried out storing record by device.
Although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, permissible
Understand and these embodiments can be carried out multiple change without departing from the principles and spirit of the present invention, revise, replace
And modification, the scope of the present invention be defined by the appended.
Claims (4)
1. government affairs information defense controls method, it is characterised in that: include following steps:
(1), the government affairs information in client-access disk space generate the puppet that comprise deceptive information corresponding with government affairs information
File, is then transferred to monitor and report to the police clothes by file monitoring with evidence obtaining platform by the information indicating government affairs information and pseudo-file
Business device stores;
(2), when cloud server end has user to access pseudo-file corresponding to government affairs information in disk space, file monitoring and evidence obtaining
Platform monitors government affairs information and the access situation of pseudo-file, and the access information then obtained mails to monitoring and Alarm Server,
Monitoring and the operational access information in Alarm Server analysis system, once finding that pseudo-file is accessed, monitoring and alert service
Device realizes warning function, notifies that manager investigates, and simultaneously monitors and with Alarm Server, pseudo-file is accessed information and be transferred to file
Monitoring and evidence obtaining platform, file monitoring collects disk space by the information of intrusion behavior with evidence obtaining platform.
Government affairs information defense controls method the most according to claim 1, it is characterised in that: described file monitoring and evidence obtaining
Platform includes file monitoring module, communication module and evidence obtaining module, described file monitoring module and evidence obtaining module respectively with
Communication module connects;The described government affairs information in client-access disk space also generates and corresponding with government affairs information comprises void
The pseudo-file of false information, then passes sequentially through file monitoring module, communication module by the information indicating government affairs information and pseudo-file
It is transferred to monitor and stores with Alarm Server;In cloud server end has user to access disk space, government affairs information is corresponding
During pseudo-file, file monitoring module monitors government affairs information and the access situation of pseudo-file, the access information then obtained is by logical
Letter module mails to monitoring and Alarm Server, monitor and the operational access information in Alarm Server analysis system, once sending out
Existing pseudo-file is accessed, and monitors and Alarm Server realizes warning function, notify that manager investigates, simultaneously monitor and alert service
Pseudo-file is accessed information and is transferred to, by communication module, module of collecting evidence by device, about intrusion behavior in evidence obtaining module collection system
Information.
Government affairs information defense controls method the most according to claim 1, it is characterised in that: the information of described intrusion behavior
Include invasion time, invasion IP address and the pseudo-file information of access.
Government affairs information defense controls method the most according to claim 1, it is characterised in that: described supervision and alert service
Operational access information in device analysis system, when pseudo-file is not accessed, monitors and access information is deposited by Alarm Server
Storage record.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610604221.9A CN106203175A (en) | 2016-07-28 | 2016-07-28 | Government affairs information defense controls method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610604221.9A CN106203175A (en) | 2016-07-28 | 2016-07-28 | Government affairs information defense controls method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106203175A true CN106203175A (en) | 2016-12-07 |
Family
ID=57495692
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610604221.9A Pending CN106203175A (en) | 2016-07-28 | 2016-07-28 | Government affairs information defense controls method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106203175A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1455899A (en) * | 2000-07-25 | 2003-11-12 | 有限会社信息安全 | Secret information recorded medium, protection method, protection storing method and system for information access alarming system |
US20080123481A1 (en) * | 2004-10-21 | 2008-05-29 | Koninklijke Philips Electronics, N.V. | Method for Saving ther Keylockers on Optical Discs |
CN104091098A (en) * | 2014-07-15 | 2014-10-08 | 福建师范大学 | Document operation safety auditing system |
CN204576509U (en) * | 2015-03-10 | 2015-08-19 | 南宁市城规地理信息技术中心 | City planning information inquiry and government public interaction device |
-
2016
- 2016-07-28 CN CN201610604221.9A patent/CN106203175A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1455899A (en) * | 2000-07-25 | 2003-11-12 | 有限会社信息安全 | Secret information recorded medium, protection method, protection storing method and system for information access alarming system |
US20080123481A1 (en) * | 2004-10-21 | 2008-05-29 | Koninklijke Philips Electronics, N.V. | Method for Saving ther Keylockers on Optical Discs |
CN104091098A (en) * | 2014-07-15 | 2014-10-08 | 福建师范大学 | Document operation safety auditing system |
CN204576509U (en) * | 2015-03-10 | 2015-08-19 | 南宁市城规地理信息技术中心 | City planning information inquiry and government public interaction device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110493348B (en) | Intelligent monitoring alarm system based on Internet of things | |
CN104901838B (en) | Enterprise network security event management system and its method | |
CN104063473B (en) | A kind of database audit monitoring system and its method | |
CN108270716A (en) | A kind of audit of information security method based on cloud computing | |
CN110300100A (en) | The association analysis method and system of log audit | |
CN201682559U (en) | Intelligent video analyzing and monitoring pick-up camera | |
CN103491354A (en) | System operation monitoring and controlling visual platform | |
Bauman et al. | Using social sensors for detecting emergency events: a case of power outages in the electrical utility industry | |
CN110768846A (en) | Intelligent substation network safety protection system | |
CN106339305A (en) | Supervision and examination method for security of database | |
KR101256507B1 (en) | An malicious insider detection system via user behavior analysis and method thereof | |
CN112698915A (en) | Multi-cluster unified monitoring alarm method, system, equipment and storage medium | |
CN103166788A (en) | Centralized control management system | |
CN112104659A (en) | Real-time monitoring platform based on government affair application safety | |
Lee et al. | A study on efficient log visualization using d3 component against apt: How to visualize security logs efficiently? | |
CN113762543A (en) | Bus operation maintenance system | |
CN108462712A (en) | A kind of data flow management early warning system | |
CN205510080U (en) | A safety control platform for catenet | |
CN112449019A (en) | IMS intelligent Internet of things operation and maintenance management platform | |
CN105607983B (en) | Data exception monitoring method and device | |
CN106203175A (en) | Government affairs information defense controls method | |
KR101973728B1 (en) | Integration security anomaly symptom monitoring system | |
CN114726649B (en) | Situation awareness evaluation method and device, terminal equipment and storage medium | |
CN105530136A (en) | Electric power scheduling system and business monitoring method for the same | |
CN105353713A (en) | Computer room monitoring system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161207 |