CN112364328A - Computer network information safety monitoring system - Google Patents
Computer network information safety monitoring system Download PDFInfo
- Publication number
- CN112364328A CN112364328A CN202011429273.XA CN202011429273A CN112364328A CN 112364328 A CN112364328 A CN 112364328A CN 202011429273 A CN202011429273 A CN 202011429273A CN 112364328 A CN112364328 A CN 112364328A
- Authority
- CN
- China
- Prior art keywords
- computer
- unit
- network
- management
- enterprise
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 49
- 238000007726 management method Methods 0.000 claims abstract description 74
- 238000009826 distribution Methods 0.000 claims abstract description 19
- 238000012217 deletion Methods 0.000 claims description 8
- 230000037430 deletion Effects 0.000 claims description 8
- 238000012423 maintenance Methods 0.000 claims description 7
- 238000012986 modification Methods 0.000 claims description 5
- 230000004048 modification Effects 0.000 claims description 5
- 238000005516 engineering process Methods 0.000 abstract description 8
- 238000000034 method Methods 0.000 description 17
- 230000008569 process Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 7
- 238000003860 storage Methods 0.000 description 7
- 230000007246 mechanism Effects 0.000 description 6
- 238000012795 verification Methods 0.000 description 6
- 238000003780 insertion Methods 0.000 description 4
- 230000037431 insertion Effects 0.000 description 4
- 238000010276 construction Methods 0.000 description 3
- 230000007123 defense Effects 0.000 description 3
- 230000008520 organization Effects 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/242—Query formulation
- G06F16/2433—Query languages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Computational Linguistics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a computer network information safety monitoring system, which comprises a network safety management module, a monitoring module and a monitoring module, wherein the network safety management module is used for carrying out network planning and computer distribution and monitoring; the user identity authentication module is used for identifying the physical identity and the digital identity of the user; and the data encryption protection module is used for carrying out forced automatic encryption on the file on the enterprise computer, identifying the external equipment which is not authenticated by the administrator and forbidding the external equipment which is not authenticated by the administrator to access the system. The invention combines the user identity authentication and the data encryption technology to protect the data security in the enterprise network information system and prevent the leakage or the theft of the confidential information of the enterprise.
Description
Technical Field
The invention relates to the field of network information security, in particular to a computer network information security monitoring system.
Background
The rapid development of enterprise informatization construction and the relative lag of enterprise network information security management form a outstanding contradiction to be solved urgently. The enterprise internal network management and information security protection are used as an important part of enterprise informatization construction, and have very practical and important significance for improving the enterprise production efficiency, protecting the enterprise secrets and promoting the enterprise development. The current situation of enterprise network information security is continuously promoted along with the information construction of enterprise networks, various data information plays a vital role in the whole business process of enterprises, and the security and confidentiality of information data also become vital problems. The loss of enterprises caused by information stealing exceeds the loss caused by virus damage and hacking, and the loss caused by abuse, loss and theft of various important data and files is in billions.
One important reason for this situation is that the current security products of the enterprise network are actually rights management for the digital identities of users, but do not solve the problem that the physical identities and digital identities of users correspond to each other, i.e. lack the basis for providing rights management for these security systems. The traditional safety protection product only solves the problem of preventing external personnel from illegally accessing, but cannot solve the problem that internal personnel carry out secondary propagation on electronic documents through e-mails, mobile hard disks or notebook computers. The enterprise has multiple aspects and multiple layers of requirements on the information security protection system, and the enterprise needs to establish a multi-layer information security protection system from inside to outside, combine passive defense and active protection, and finally realize all-round protection on confidential information of the enterprise.
Disclosure of Invention
The invention provides a computer network information safety monitoring system for solving the problems.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
a computer network information safety monitoring system comprises a network safety management module, a monitoring module and a monitoring module, wherein the network safety management module is used for carrying out network planning and computer distribution and monitoring;
the user identity authentication module is used for identifying the physical identity and the digital identity of the user;
and the data encryption protection module is used for carrying out forced automatic encryption on the file on the enterprise computer, identifying the external equipment which is not authenticated by the administrator and forbidding the external equipment which is not authenticated by the administrator to access the system.
Optionally, the network security management module includes a network planning and address management unit, a network management policy and distribution unit, a network remote monitoring and maintenance unit, and an intrusion monitoring and security early warning unit.
Optionally, the network planning and address management unit is configured to perform centralized management on an IP address, a computer name, a work authority, network parameter settings, and the like of the workstation.
Optionally, the network management policy and distribution unit is configured to complete generation, modification, deletion, and distribution of policies.
Optionally, the network remote monitoring and maintaining unit is configured to remotely monitor the computer output device.
Optionally, the intrusion monitoring and security early warning unit is configured to alarm when the computer accesses an unauthorized external device.
Optionally, the user identity authentication module includes a physical identity authentication unit and a digital identity authentication unit, the physical identity authentication unit is configured to identify human body characteristics of the user, and the digital identity authentication unit is configured to set each user to different rights management to access files with different security levels.
Optionally, the data encryption protection module includes an encryption unit and an identification unit, the encryption unit is configured to perform forced automatic encryption on a file on an enterprise computer, and the identification unit is configured to identify an external device that is not authenticated by an administrator.
Optionally, the system further comprises a database server, and the database server is used for storing, backing up and managing data and information in the system.
Optionally, the system further comprises a client, the client is deployed on the enterprise user computer, a system administrator manages and protects the client through a management console to realize centralized management and protection of the enterprise user computer, and the client performs login protection on the computer through a user identity recognition system combined with hardware.
Compared with the prior art, the invention has the technical progress that:
the invention solves the current situation and existing problems of the current enterprise in the aspects of network management and information protection, and provides a method for protecting the data security in an enterprise network information system by combining user identity authentication and data encryption technology on the basis of realizing the security management of an intranet, so as to prevent the confidential information of the enterprise from being leaked or stolen.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.
In the drawings:
FIG. 1 is a block diagram of the present invention.
Detailed Description
The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Example one
As shown in fig. 1, the present invention discloses a computer network information security monitoring system, which comprises:
the network security management module is used for planning a network and distributing and monitoring a computer;
the user identity authentication module is used for identifying the physical identity and the digital identity of the user;
and the data encryption protection module is used for carrying out forced automatic encryption on the file on the enterprise computer, identifying the external equipment which is not authenticated by the administrator and forbidding the external equipment which is not authenticated by the administrator to access the system.
The invention solves the current situation and existing problems of the current enterprise in the aspects of network management and information protection, and provides a method for protecting the data security in an enterprise network information system by combining user identity authentication and data encryption technology on the basis of realizing the security management of an intranet, so as to prevent the confidential information of the enterprise from being leaked or stolen.
Example two
The invention discloses a computer network information safety monitoring system, which comprises a network safety management module, a network planning and address management unit, a network management strategy and distribution unit, a network remote monitoring and maintenance unit and an intrusion monitoring and safety early warning unit, wherein the network safety management module is used for carrying out network planning and computer distribution and monitoring.
The network planning and address management unit is used for planning a network (VLAN) and distributing a computer according to the setting of an enterprise mechanism, and the IP address, the computer name, the work authority, the network parameter setting and the like of the workstation are managed in a centralized way by adopting an address security binding technology based on the MAC address.
The network management strategy and distribution unit is used for completing the generation, modification, deletion and distribution of the strategy.
The network remote monitoring and maintaining unit is used for remotely monitoring the computer output equipment.
And the intrusion monitoring and safety early warning unit is used for alarming when the computer is accessed to the unauthorized external equipment.
And the user identity authentication module is the most important defense line for ensuring the information safety. The user identity authentication is used for solving the problem that the physical identity and the digital identity of the user correspond to each other, so that the basis of authority management is provided for other security management systems.
If no effective identity authentication means exists, the identity of an authorized visitor can be easily forged, an information security protection strategy is established by taking users as objects through a reliable identity authentication mechanism, and a safe information leakage prevention system can be established by taking security measures such as authority management, role definition, system tracking logs and the like aiming at each user.
The system specifically comprises a physical identity authentication unit and a digital identity authentication unit, wherein the physical identity authentication unit is used for identifying human body characteristics of users, and the digital identity authentication unit is used for setting each user to be in different authority management so as to access files with different security levels.
And the data encryption protection module comprises an encryption unit and an identification unit, and the encryption unit is used for carrying out forced automatic encryption on the files on the enterprise computer.
The identification unit is used for identifying the external equipment which is not authenticated by the administrator and forbidding the external equipment which is not authenticated by the administrator to access the system.
The purpose of encrypting and protecting the data is to prevent information from leaking through an internal network or an external network intentionally or sparsely by users in an organization, so that the encrypted data file cannot be accessed and used after leaving the enterprise computer. Because most of the important data files of the enterprise exist in the form of electronic documents, the files on the computer of the enterprise are forcibly and automatically encrypted by adopting a process forced encryption technology, so that the encrypted drawing files and document files leave the computer of the enterprise and cannot be used, thus some core data in the enterprise are firmly limited in the internal environment of the enterprise, and the security of some core data in the enterprise is ensured. The external equipment which is not authenticated by the administrator is identified, and the external equipment which is not authenticated by the administrator is prohibited from accessing the system, so that the safety of the whole system is ensured.
Meanwhile, the invention also comprises a database server, wherein the database server is used as a data center of the whole system and is responsible for realizing the storage, backup and management of various data and information in the system, and the MSSQLServer2000/2005 database system is adopted, and is mainly used for receiving the setting information of a system administrator from the management end and then distributing the setting information to the client end for realization.
The SQL Server adopts secondary security verification, login verification and permission verification of database user accounts and roles. SQL Server supports two authentication modes: windows NT authentication and SQL Server authentication. Version 7.0 supports multiple types of roles, and the introduction of the concept of the role facilitates the management of the authority and also enables the distribution of the authority to be more flexible.
SQL Server provides a predefined Server and database role for common administrative functions that can easily grant a selected set of permissions to a particular user. The SQL Server can run on different operation platforms and support various different types of network protocols such as TCP/IP, IPX/SPX, Apple Talk and the like. The software running platform of the SQL Server at the Server end is Windows NT, Windows9x, and at the client end can be Windows3.x, Windows NT, Windows9x, or systems developed by other manufacturers such as Unix, Apple Macintosh, etc.
Microsoft's SQL Server is a perfect client/Server system. The SQL Server needs to be installed on the platform of Windows NT, and the Windows NT can support the platforms such as Intel 386, Power PC, MIPS, Alpha PC and RISC, etc., which makes the SQL Server have sufficient Power and function.
The database application programs adopted in the method are all based on SQL Server, ODBC and standard SQL query can be very simply transplanted to any database supporting ODBC, such as: oracle, Informix, Db2 and Access, before reading the relevant ASP database programming techniques, confirms that you are at least familiar with one database management system and can operate the database using standard SQL query language.
SQL Server provides software of Server end, this part needs to be installed on NT Server, SQL Server's client can be installed in many client PC systems, Windows can let client carry on operations such as the establishment, maintenance and access of the database, SQL Server can define 32767 databases at most, each database can define 20 hundred million tables, each table can have 250 fields, the data number of each table is not limited, each table can define 250 indexes, one of them can be Clustered index.
The SQL Server uses a database query language called as Transact-SQL, which is the core of the SQL Server, the Transact-SQL strengthens the original SQL keyword to access, store and process data, the Transact-SQL expands the flow control designation, so that you can easily write powerful storage process, they are stored in the Server and compiled in advance, the execution speed is very fast, the trigger is a special storage process to ensure the integrity of the SQL Server database reference, you can set up the insertion, deletion and update trigger to control the insertion, deletion and update of the data column in the related table, you can also use the Rule (Rule), default (default) and restriction (Constraints) to help apply the new value in the table.
EXAMPLE III
The invention discloses a computer network information safety monitoring system, which comprises a network safety management module, a network planning and address management unit, a network management strategy and distribution unit, a network remote monitoring and maintenance unit and an intrusion monitoring and safety early warning unit, wherein the network safety management module is used for carrying out network planning and computer distribution and monitoring.
The network planning and address management unit is used for planning a network (VLAN) and distributing a computer according to the setting of an enterprise mechanism, and the IP address, the computer name, the work authority, the network parameter setting and the like of the workstation are managed in a centralized way by adopting an address security binding technology based on the MAC address.
The network management strategy and distribution unit is used for completing the generation, modification, deletion and distribution of the strategy.
The network remote monitoring and maintaining unit is used for remotely monitoring the computer output equipment.
And the intrusion monitoring and safety early warning unit is used for alarming when the computer is accessed to the unauthorized external equipment.
And the user identity authentication module is the most important defense line for ensuring the information safety. The user identity authentication is used for solving the problem that the physical identity and the digital identity of the user correspond to each other, so that the basis of authority management is provided for other security management systems.
If no effective identity authentication means exists, the identity of an authorized visitor can be easily forged, an information security protection strategy is established by taking users as objects through a reliable identity authentication mechanism, and a safe information leakage prevention system can be established by taking security measures such as authority management, role definition, system tracking logs and the like aiming at each user.
The system specifically comprises a physical identity authentication unit and a digital identity authentication unit, wherein the physical identity authentication unit is used for identifying human body characteristics of users, and the digital identity authentication unit is used for setting each user to be in different authority management so as to access files with different security levels.
And the data encryption protection module comprises an encryption unit and an identification unit, and the encryption unit is used for carrying out forced automatic encryption on the files on the enterprise computer.
The identification unit is used for identifying the external equipment which is not authenticated by the administrator and forbidding the external equipment which is not authenticated by the administrator to access the system.
The purpose of encrypting and protecting the data is to prevent information from leaking through an internal network or an external network intentionally or sparsely by users in an organization, so that the encrypted data file cannot be accessed and used after leaving the enterprise computer.
Because most of the important data files of the enterprise exist in the form of electronic documents, the files on the computer of the enterprise are forcibly and automatically encrypted by adopting a process forced encryption technology, so that the encrypted drawing files and document files leave the computer of the enterprise and cannot be used, thus some core data in the enterprise are firmly limited in the internal environment of the enterprise, and the security of some core data in the enterprise is ensured. The external equipment which is not authenticated by the administrator is identified, and the external equipment which is not authenticated by the administrator is prohibited from accessing the system, so that the safety of the whole system is ensured.
Meanwhile, the invention also comprises a database server, wherein the database server is used as a data center of the whole system and is responsible for realizing the storage, backup and management of various data and information in the system, and the MSSQLServer2000/2005 database system is adopted, and is mainly used for receiving the setting information of a system administrator from the management end and then distributing the setting information to the client end for realization.
The SQL Server adopts secondary security verification, login verification and permission verification of database user accounts and roles. SQL Server supports two authentication modes: windows NT authentication and SQL Server authentication. Version 7.0 supports multiple types of roles, and the introduction of the concept of the role facilitates the management of the authority and also enables the distribution of the authority to be more flexible.
SQL Server provides a predefined Server and database role for common administrative functions that can easily grant a selected set of permissions to a particular user. The SQL Server can run on different operation platforms and support various different types of network protocols such as TCP/IP, IPX/SPX, Apple Talk and the like. The software running platform of the SQL Server at the Server end is Windows NT, Windows9x, and at the client end can be Windows3.x, Windows NT, Windows9x, or systems developed by other manufacturers such as Unix, Apple Macintosh, etc.
Microsoft's SQL Server is a perfect client/Server system. The SQL Server needs to be installed on the platform of Windows NT, and the Windows NT can support the platforms such as Intel 386, Power PC, MIPS, Alpha PC and RISC, etc., which makes the SQL Server have sufficient Power and function.
The database application programs adopted in the method are all based on SQL Server, ODBC and standard SQL query can be very simply transplanted to any database supporting ODBC, such as: oracle, Informix, Db2 and Access, before reading the relevant ASP database programming techniques, confirms that you are at least familiar with one database management system and can operate the database using standard SQL query language.
SQL Server provides software of Server end, this part needs to be installed on NT Server, SQL Server's client can be installed in many client PC systems, Windows can let client carry on operations such as the establishment, maintenance and access of the database, SQL Server can define 32767 databases at most, each database can define 20 hundred million tables, each table can have 250 fields, the data number of each table is not limited, each table can define 250 indexes, one of them can be Clustered index.
The SQL Server uses a database query language called as Transact-SQL, which is the core of the SQL Server, the Transact-SQL strengthens the original SQL keyword to access, store and process data, the Transact-SQL expands the flow control designation, so that you can easily write powerful storage process, they are stored in the Server and compiled in advance, the execution speed is very fast, the trigger is a special storage process to ensure the integrity of the SQL Server database reference, you can set up the insertion, deletion and update trigger to control the insertion, deletion and update of the data column in the related table, you can also use the Rule (Rule), default (default) and restriction (Constraints) to help apply the new value in the table.
The system comprises a management console, a client, a system administrator, a management console and a management control console, wherein the management console is used for managing and protecting the client, so that the centralized management and the protection of the enterprise user computers are realized, the client logs in and protects the computers through the user identity recognition system combined with hardware, the client is deployed on the enterprise user computers, the management console is used for managing and protecting the client through the management console, so that the centralized management and the protection of the enterprise user computers are realized, and the client logs in and protects the computers through the user identity recognition system combined with the hardware.
The client program deployed by the client on the computer of the enterprise user has undeletability, that is, the user cannot uninstall or stop running the client program without authorization of a system administrator. Client programs deployed on enterprise user computers are undeletable, i.e., users cannot uninstall or stop running a client program without authorization from a system administrator. According to the requirements of system hierarchical structure design, firstly, network security management based on MAC addresses is realized. The network management module has the main functions of performing website planning and computer allocation according to enterprise organization settings, performing centralized management on the IP address, the computer name, the work authority, the network parameter setting and the like of each workstation by adopting an address binding technology of tombs and MAC addresses, and realizing the functions of automatic distribution of network management strategies and remote network maintenance and monitoring.
The main function of the user desktop protection contract taking user identity authentication as the main content is to manage enterprise users according to affiliated mechanisms and departments, adopt a safe login mechanism of double-factor identity authentication, realize user safe login by setting safety strategies such as attributes, safety right levels and the like for the users and combining a client system, and ensure the authenticity of user identity authentication.
The encrypted storage and access module of data is relatively independent of one functional module. The key point is to realize the forced encryption of the data information, so that the encrypted data file can not be accessed and used after leaving the enterprise computer. Because data encryption is an independent technical field, mature process encryption products are available for enterprises in the market.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the scope of the claims of the present invention.
Claims (10)
1. A computer network information security monitoring system, comprising:
the network security management module is used for planning a network and distributing and monitoring a computer;
the user identity authentication module is used for identifying the physical identity and the digital identity of the user;
and the data encryption protection module is used for carrying out forced automatic encryption on the file on the enterprise computer, identifying the external equipment which is not authenticated by the administrator and forbidding the external equipment which is not authenticated by the administrator to access the system.
2. The computer network information safety monitoring system according to claim 1, characterized in that: the network security management module comprises: the system comprises a network planning and address management unit, a network management strategy and distribution unit, a network remote monitoring and maintenance unit and an intrusion monitoring and safety early warning unit.
3. The computer network information safety monitoring system according to claim 2, characterized in that: the network planning and address management unit is used for carrying out centralized management on the IP address, the computer name, the work authority, the network parameter setting and the like of the workstation.
4. The computer network information safety monitoring system according to claim 2, characterized in that: the network management strategy and distribution unit is used for completing the generation, modification, deletion and distribution of the strategy.
5. The computer network information safety monitoring system according to claim 2, characterized in that: the network remote monitoring and maintaining unit is used for remotely monitoring the computer output equipment.
6. The computer network information safety monitoring system according to claim 2, characterized in that: and the intrusion monitoring and safety early warning unit is used for alarming when the computer is accessed to the unauthorized external equipment.
7. The computer network information safety monitoring system according to claim 1, characterized in that: the user identity authentication module comprises a physical identity authentication unit and a digital identity authentication unit, wherein the physical identity authentication unit is used for identifying human body characteristics of users, and the digital identity authentication unit is used for setting each user to be in different authority management so as to access files with different security levels.
8. The computer network information safety monitoring system according to claim 1, characterized in that: the data encryption protection module comprises an encryption unit and an identification unit, wherein the encryption unit is used for forcibly and automatically encrypting files on the enterprise computer, and the identification unit is used for identifying the external equipment which is not authenticated by the administrator.
9. The computer network information safety monitoring system according to claim 1, characterized in that: the system also comprises a database server which is used for storing, backing up and managing the data and the information in the system.
10. The computer network information safety monitoring system according to claim 9, wherein: the system comprises a management console, a client and a system administrator, wherein the management console is used for managing and protecting the client, the client is deployed on an enterprise user computer, the system administrator manages and protects the client through the management console so as to realize the centralized management and protection of the enterprise user computer, and the client performs login protection on the computer through a user identity recognition system combined with hardware.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011429273.XA CN112364328A (en) | 2020-12-09 | 2020-12-09 | Computer network information safety monitoring system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011429273.XA CN112364328A (en) | 2020-12-09 | 2020-12-09 | Computer network information safety monitoring system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112364328A true CN112364328A (en) | 2021-02-12 |
Family
ID=74535149
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011429273.XA Pending CN112364328A (en) | 2020-12-09 | 2020-12-09 | Computer network information safety monitoring system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112364328A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113656479A (en) * | 2021-08-18 | 2021-11-16 | 国网北京市电力公司 | Data processing method and device |
CN115378646A (en) * | 2022-07-14 | 2022-11-22 | 刘书凯 | Network security monitoring system for computer communication |
CN116232770A (en) * | 2023-05-08 | 2023-06-06 | 中国石油大学(华东) | Enterprise network safety protection system and method based on SDN controller |
-
2020
- 2020-12-09 CN CN202011429273.XA patent/CN112364328A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113656479A (en) * | 2021-08-18 | 2021-11-16 | 国网北京市电力公司 | Data processing method and device |
CN115378646A (en) * | 2022-07-14 | 2022-11-22 | 刘书凯 | Network security monitoring system for computer communication |
CN116232770A (en) * | 2023-05-08 | 2023-06-06 | 中国石油大学(华东) | Enterprise network safety protection system and method based on SDN controller |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111709056B (en) | Data sharing method and system based on block chain | |
CN112364328A (en) | Computer network information safety monitoring system | |
CN111064718B (en) | Dynamic authorization method and system based on user context and policy | |
CN101827101A (en) | Information asset protection method based on credible isolated operating environment | |
CN109684866A (en) | A kind of safe USB disk system for supporting multi-user data to protect | |
CN109766711A (en) | A kind of method of safety management database | |
CN102970317A (en) | Safety design scheme of private cloud storage system | |
Thuraisingham et al. | Extended RBAC-based design and implementation for a secure data warehouse | |
Alawneh et al. | Defining and analyzing insiders and their threats in organizations | |
KR101025029B1 (en) | Implementation method for integration database security system using electronic authentication | |
Nanda et al. | Oracle Privacy Security Auditing: Includes Federal Law Compliance with HIPAA, Sarbanes Oxley and the Gramm Leach Bliley Act GLB | |
CN202218262U (en) | Safety management system for internal network information | |
CN108600178A (en) | A kind of method for protecting and system, reference platform of collage-credit data | |
Zaman et al. | Self-protection against insider threats in DBMS through policies implementation | |
CN111291400A (en) | Financial data protection system based on block chain | |
Kadebu et al. | A security requirements perspective towards a secured nosql database environment | |
Yuan et al. | A fine-grained access control method based on role permission management | |
Batra et al. | Autonomous multilevel policy based security configuration in distributed database | |
Priscakova et al. | Model of solutions for data security in cloud computing | |
Kaushik et al. | A review of efficient data utilization schemes in cloud computing | |
Jaidi | Advanced access control to information systems: Requirements, compliance and future directives | |
Langmead | Comparative Evaluation of Access Control Models | |
Zhao et al. | The data security problems discussion in application of library service platform | |
Bhatnagar | Security in Relational Databases | |
Khodadadi et al. | Privacy Issues and Protection in Secure Data Outsourcing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20210212 |