CN106203175A - Government affairs information defense controls method - Google Patents

Government affairs information defense controls method Download PDF

Info

Publication number
CN106203175A
CN106203175A CN201610604221.9A CN201610604221A CN106203175A CN 106203175 A CN106203175 A CN 106203175A CN 201610604221 A CN201610604221 A CN 201610604221A CN 106203175 A CN106203175 A CN 106203175A
Authority
CN
China
Prior art keywords
information
file
government affairs
pseudo
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610604221.9A
Other languages
Chinese (zh)
Inventor
曹崧
毛峰
潘维
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Ylz Information Technology Co Ltd
Original Assignee
Anhui Ylz Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Ylz Information Technology Co Ltd filed Critical Anhui Ylz Information Technology Co Ltd
Priority to CN201610604221.9A priority Critical patent/CN106203175A/en
Publication of CN106203175A publication Critical patent/CN106203175A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a kind of government affairs information defense controls method, pseudo-file preventing mechanism is used to generate the pseudo-file corresponding with government affairs information, management personnel for government affairs information management system, it can access known government affairs information by cloud server end, and Migrant women cannot judge real government affairs information and pseudo-file, when pseudo-file is once accessed, can realize reporting to the police and evidence obtaining, thus improve the safety of government affairs information.

Description

Government affairs information defense controls method
Technical field
The present invention relates to the management domain of government affairs information, specifically a kind of government affairs information defense controls method.
Background technology
Government affairs information is an important class of information, is to reflect government affairs work and the feelings of correlate thereof in state affairs The general name of report, situation, data, data, chart, written material and audio-video materials etc..Government affairs information should meet three bars simultaneously Part, one is the information grasped by government bodies, refers to government bodies legal generations, gathers and integrate;Two is with economical, social Managing the information relevant with public service, three is the content reflected by specific support.
In government affairs information management system, government affairs information is the most important, needs to carry out a certain degree of secrecy processing, if Do not carry out if the government affairs information of secrecy processing is transmitted on cloud service platform and processes, it is likely that government affairs can be caused to believe The leakage of breath so that cannot effectively ensure the safety of government affairs information.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of government affairs information defense controls method, introduces pseudo-file protection machine System, thus improve the safety of government affairs information.
The technical scheme is that
Government affairs information defense controls method, includes following steps:
(1), the government affairs information in client-access disk space generate the puppet that comprise deceptive information corresponding with government affairs information File, is then transferred to monitor and report to the police clothes by file monitoring with evidence obtaining platform by the information indicating government affairs information and pseudo-file Business device stores;
(2), when cloud server end has user to access pseudo-file corresponding to government affairs information in disk space, file monitoring and evidence obtaining Platform monitors government affairs information and the access situation of pseudo-file, and the access information then obtained mails to monitoring and Alarm Server, Monitoring and the operational access information in Alarm Server analysis system, once finding that pseudo-file is accessed, monitoring and alert service Device realizes warning function, notifies that manager investigates, and simultaneously monitors and with Alarm Server, pseudo-file is accessed information and be transferred to file Monitoring and evidence obtaining platform, file monitoring collects disk space by the information of intrusion behavior with evidence obtaining platform.
Described file monitoring includes file monitoring module, communication module and evidence obtaining module with evidence obtaining platform, described File monitoring module and evidence obtaining module are connected with communication module respectively;The described government affairs information in client-access disk space And generate the pseudo-file that comprise deceptive information corresponding with government affairs information, then the information indicating government affairs information and pseudo-file is depended on Secondary by file monitoring module, communication module be transferred to monitor and Alarm Server store;When cloud server end has user During the pseudo-file that in access disk space, government affairs information is corresponding, file monitoring module monitors government affairs information and the access feelings of pseudo-file Condition, the access information then obtained mails to, to monitoring and Alarm Server, monitor and Alarm Server analysis by communication module Operational access information in system, once finding that pseudo-file is accessed, monitoring and Alarm Server realizes warning function, notice pipe Reason person investigates, and simultaneously monitors and with Alarm Server, pseudo-file accesses information and be transferred to, by communication module, module of collecting evidence, collects evidence About the information of intrusion behavior in module collection system.
The information of described intrusion behavior includes invasion time, invasion IP address and the pseudo-file information of access.
Operational access information in described supervision and Alarm Server analysis system, when pseudo-file is not accessed, monitors Carry out storing record to access information with Alarm Server.
Advantages of the present invention:
The present invention uses pseudo-file preventing mechanism to generate the pseudo-file corresponding with government affairs information, for government affairs information management system Management personnel, it can access known government affairs information by cloud server end, and Migrant women cannot judge real government affairs Information and pseudo-file, when pseudo-file is once accessed, can realize reporting to the police and evidence obtaining, thus the safety that improve government affairs information is prevented Protecting property.
Accompanying drawing explanation
Fig. 1 is the theory diagram of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise Embodiment, broadly falls into the scope of protection of the invention.
Government affairs information defense controls method, includes following steps:
(1), the government affairs information in client-access disk space generate the puppet that comprise deceptive information corresponding with government affairs information File, then passes sequentially through the file monitoring module of file monitoring and evidence obtaining platform by the information indicating government affairs information and pseudo-file It is transferred to monitor with communication module and stores with Alarm Server;
(2), when cloud server end has user to access pseudo-file corresponding to government affairs information in disk space, file monitoring and evidence obtaining The file monitoring module monitors government affairs information of platform and the access situation of pseudo-file, the access information then obtained is supervised by file Depending on mailing to, to monitoring and Alarm Server, monitor and the operation in Alarm Server analysis system with the communication module of evidence obtaining platform Access information, once finding that pseudo-file is accessed, monitoring and Alarm Server realizes warning function, notifying that manager investigates, with Time monitor and Alarm Server pseudo-file is accessed information by file monitoring with collect evidence platform communication module be transferred to file Monitoring and the evidence obtaining module of evidence obtaining platform, the evidence obtaining module collection disk space of file monitoring and evidence obtaining platform is by intrusion behavior Information (invasion time, invasion IP address and the pseudo-file information of access);When pseudo-file is not accessed, monitor and alert service Access information is carried out storing record by device.
Although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, permissible Understand and these embodiments can be carried out multiple change without departing from the principles and spirit of the present invention, revise, replace And modification, the scope of the present invention be defined by the appended.

Claims (4)

1. government affairs information defense controls method, it is characterised in that: include following steps:
(1), the government affairs information in client-access disk space generate the puppet that comprise deceptive information corresponding with government affairs information File, is then transferred to monitor and report to the police clothes by file monitoring with evidence obtaining platform by the information indicating government affairs information and pseudo-file Business device stores;
(2), when cloud server end has user to access pseudo-file corresponding to government affairs information in disk space, file monitoring and evidence obtaining Platform monitors government affairs information and the access situation of pseudo-file, and the access information then obtained mails to monitoring and Alarm Server, Monitoring and the operational access information in Alarm Server analysis system, once finding that pseudo-file is accessed, monitoring and alert service Device realizes warning function, notifies that manager investigates, and simultaneously monitors and with Alarm Server, pseudo-file is accessed information and be transferred to file Monitoring and evidence obtaining platform, file monitoring collects disk space by the information of intrusion behavior with evidence obtaining platform.
Government affairs information defense controls method the most according to claim 1, it is characterised in that: described file monitoring and evidence obtaining Platform includes file monitoring module, communication module and evidence obtaining module, described file monitoring module and evidence obtaining module respectively with Communication module connects;The described government affairs information in client-access disk space also generates and corresponding with government affairs information comprises void The pseudo-file of false information, then passes sequentially through file monitoring module, communication module by the information indicating government affairs information and pseudo-file It is transferred to monitor and stores with Alarm Server;In cloud server end has user to access disk space, government affairs information is corresponding During pseudo-file, file monitoring module monitors government affairs information and the access situation of pseudo-file, the access information then obtained is by logical Letter module mails to monitoring and Alarm Server, monitor and the operational access information in Alarm Server analysis system, once sending out Existing pseudo-file is accessed, and monitors and Alarm Server realizes warning function, notify that manager investigates, simultaneously monitor and alert service Pseudo-file is accessed information and is transferred to, by communication module, module of collecting evidence by device, about intrusion behavior in evidence obtaining module collection system Information.
Government affairs information defense controls method the most according to claim 1, it is characterised in that: the information of described intrusion behavior Include invasion time, invasion IP address and the pseudo-file information of access.
Government affairs information defense controls method the most according to claim 1, it is characterised in that: described supervision and alert service Operational access information in device analysis system, when pseudo-file is not accessed, monitors and access information is deposited by Alarm Server Storage record.
CN201610604221.9A 2016-07-28 2016-07-28 Government affairs information defense controls method Pending CN106203175A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610604221.9A CN106203175A (en) 2016-07-28 2016-07-28 Government affairs information defense controls method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610604221.9A CN106203175A (en) 2016-07-28 2016-07-28 Government affairs information defense controls method

Publications (1)

Publication Number Publication Date
CN106203175A true CN106203175A (en) 2016-12-07

Family

ID=57495692

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610604221.9A Pending CN106203175A (en) 2016-07-28 2016-07-28 Government affairs information defense controls method

Country Status (1)

Country Link
CN (1) CN106203175A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1455899A (en) * 2000-07-25 2003-11-12 有限会社信息安全 Secret information recorded medium, protection method, protection storing method and system for information access alarming system
US20080123481A1 (en) * 2004-10-21 2008-05-29 Koninklijke Philips Electronics, N.V. Method for Saving ther Keylockers on Optical Discs
CN104091098A (en) * 2014-07-15 2014-10-08 福建师范大学 Document operation safety auditing system
CN204576509U (en) * 2015-03-10 2015-08-19 南宁市城规地理信息技术中心 City planning information inquiry and government public interaction device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1455899A (en) * 2000-07-25 2003-11-12 有限会社信息安全 Secret information recorded medium, protection method, protection storing method and system for information access alarming system
US20080123481A1 (en) * 2004-10-21 2008-05-29 Koninklijke Philips Electronics, N.V. Method for Saving ther Keylockers on Optical Discs
CN104091098A (en) * 2014-07-15 2014-10-08 福建师范大学 Document operation safety auditing system
CN204576509U (en) * 2015-03-10 2015-08-19 南宁市城规地理信息技术中心 City planning information inquiry and government public interaction device

Similar Documents

Publication Publication Date Title
CN110493348B (en) Intelligent monitoring alarm system based on Internet of things
CN104901838B (en) Enterprise network security event management system and its method
CN104063473B (en) A kind of database audit monitoring system and its method
CN108270716A (en) A kind of audit of information security method based on cloud computing
CN110300100A (en) The association analysis method and system of log audit
CN201682559U (en) Intelligent video analyzing and monitoring pick-up camera
CN103491354A (en) System operation monitoring and controlling visual platform
Bauman et al. Using social sensors for detecting emergency events: a case of power outages in the electrical utility industry
CN110768846A (en) Intelligent substation network safety protection system
CN106339305A (en) Supervision and examination method for security of database
KR101256507B1 (en) An malicious insider detection system via user behavior analysis and method thereof
CN112698915A (en) Multi-cluster unified monitoring alarm method, system, equipment and storage medium
CN103166788A (en) Centralized control management system
CN112104659A (en) Real-time monitoring platform based on government affair application safety
Lee et al. A study on efficient log visualization using d3 component against apt: How to visualize security logs efficiently?
CN113762543A (en) Bus operation maintenance system
CN108462712A (en) A kind of data flow management early warning system
CN205510080U (en) A safety control platform for catenet
CN112449019A (en) IMS intelligent Internet of things operation and maintenance management platform
CN105607983B (en) Data exception monitoring method and device
CN106203175A (en) Government affairs information defense controls method
KR101973728B1 (en) Integration security anomaly symptom monitoring system
CN114726649B (en) Situation awareness evaluation method and device, terminal equipment and storage medium
CN105530136A (en) Electric power scheduling system and business monitoring method for the same
CN105353713A (en) Computer room monitoring system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161207