CN112364328A - Computer network information safety monitoring system - Google Patents

Computer network information safety monitoring system Download PDF

Info

Publication number
CN112364328A
CN112364328A CN202011429273.XA CN202011429273A CN112364328A CN 112364328 A CN112364328 A CN 112364328A CN 202011429273 A CN202011429273 A CN 202011429273A CN 112364328 A CN112364328 A CN 112364328A
Authority
CN
China
Prior art keywords
computer
unit
network
management
enterprise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011429273.XA
Other languages
Chinese (zh)
Inventor
侯波涛
郗波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Electric Power Research Institute of State Grid Hebei Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Electric Power Research Institute of State Grid Hebei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Electric Power Research Institute of State Grid Hebei Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN202011429273.XA priority Critical patent/CN112364328A/en
Publication of CN112364328A publication Critical patent/CN112364328A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2433Query languages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a computer network information safety monitoring system, which comprises a network safety management module, a monitoring module and a monitoring module, wherein the network safety management module is used for carrying out network planning and computer distribution and monitoring; the user identity authentication module is used for identifying the physical identity and the digital identity of the user; and the data encryption protection module is used for carrying out forced automatic encryption on the file on the enterprise computer, identifying the external equipment which is not authenticated by the administrator and forbidding the external equipment which is not authenticated by the administrator to access the system. The invention combines the user identity authentication and the data encryption technology to protect the data security in the enterprise network information system and prevent the leakage or the theft of the confidential information of the enterprise.

Description

Computer network information safety monitoring system
Technical Field
The invention relates to the field of network information security, in particular to a computer network information security monitoring system.
Background
The rapid development of enterprise informatization construction and the relative lag of enterprise network information security management form a outstanding contradiction to be solved urgently. The enterprise internal network management and information security protection are used as an important part of enterprise informatization construction, and have very practical and important significance for improving the enterprise production efficiency, protecting the enterprise secrets and promoting the enterprise development. The current situation of enterprise network information security is continuously promoted along with the information construction of enterprise networks, various data information plays a vital role in the whole business process of enterprises, and the security and confidentiality of information data also become vital problems. The loss of enterprises caused by information stealing exceeds the loss caused by virus damage and hacking, and the loss caused by abuse, loss and theft of various important data and files is in billions.
One important reason for this situation is that the current security products of the enterprise network are actually rights management for the digital identities of users, but do not solve the problem that the physical identities and digital identities of users correspond to each other, i.e. lack the basis for providing rights management for these security systems. The traditional safety protection product only solves the problem of preventing external personnel from illegally accessing, but cannot solve the problem that internal personnel carry out secondary propagation on electronic documents through e-mails, mobile hard disks or notebook computers. The enterprise has multiple aspects and multiple layers of requirements on the information security protection system, and the enterprise needs to establish a multi-layer information security protection system from inside to outside, combine passive defense and active protection, and finally realize all-round protection on confidential information of the enterprise.
Disclosure of Invention
The invention provides a computer network information safety monitoring system for solving the problems.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
a computer network information safety monitoring system comprises a network safety management module, a monitoring module and a monitoring module, wherein the network safety management module is used for carrying out network planning and computer distribution and monitoring;
the user identity authentication module is used for identifying the physical identity and the digital identity of the user;
and the data encryption protection module is used for carrying out forced automatic encryption on the file on the enterprise computer, identifying the external equipment which is not authenticated by the administrator and forbidding the external equipment which is not authenticated by the administrator to access the system.
Optionally, the network security management module includes a network planning and address management unit, a network management policy and distribution unit, a network remote monitoring and maintenance unit, and an intrusion monitoring and security early warning unit.
Optionally, the network planning and address management unit is configured to perform centralized management on an IP address, a computer name, a work authority, network parameter settings, and the like of the workstation.
Optionally, the network management policy and distribution unit is configured to complete generation, modification, deletion, and distribution of policies.
Optionally, the network remote monitoring and maintaining unit is configured to remotely monitor the computer output device.
Optionally, the intrusion monitoring and security early warning unit is configured to alarm when the computer accesses an unauthorized external device.
Optionally, the user identity authentication module includes a physical identity authentication unit and a digital identity authentication unit, the physical identity authentication unit is configured to identify human body characteristics of the user, and the digital identity authentication unit is configured to set each user to different rights management to access files with different security levels.
Optionally, the data encryption protection module includes an encryption unit and an identification unit, the encryption unit is configured to perform forced automatic encryption on a file on an enterprise computer, and the identification unit is configured to identify an external device that is not authenticated by an administrator.
Optionally, the system further comprises a database server, and the database server is used for storing, backing up and managing data and information in the system.
Optionally, the system further comprises a client, the client is deployed on the enterprise user computer, a system administrator manages and protects the client through a management console to realize centralized management and protection of the enterprise user computer, and the client performs login protection on the computer through a user identity recognition system combined with hardware.
Compared with the prior art, the invention has the technical progress that:
the invention solves the current situation and existing problems of the current enterprise in the aspects of network management and information protection, and provides a method for protecting the data security in an enterprise network information system by combining user identity authentication and data encryption technology on the basis of realizing the security management of an intranet, so as to prevent the confidential information of the enterprise from being leaked or stolen.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.
In the drawings:
FIG. 1 is a block diagram of the present invention.
Detailed Description
The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Example one
As shown in fig. 1, the present invention discloses a computer network information security monitoring system, which comprises:
the network security management module is used for planning a network and distributing and monitoring a computer;
the user identity authentication module is used for identifying the physical identity and the digital identity of the user;
and the data encryption protection module is used for carrying out forced automatic encryption on the file on the enterprise computer, identifying the external equipment which is not authenticated by the administrator and forbidding the external equipment which is not authenticated by the administrator to access the system.
The invention solves the current situation and existing problems of the current enterprise in the aspects of network management and information protection, and provides a method for protecting the data security in an enterprise network information system by combining user identity authentication and data encryption technology on the basis of realizing the security management of an intranet, so as to prevent the confidential information of the enterprise from being leaked or stolen.
Example two
The invention discloses a computer network information safety monitoring system, which comprises a network safety management module, a network planning and address management unit, a network management strategy and distribution unit, a network remote monitoring and maintenance unit and an intrusion monitoring and safety early warning unit, wherein the network safety management module is used for carrying out network planning and computer distribution and monitoring.
The network planning and address management unit is used for planning a network (VLAN) and distributing a computer according to the setting of an enterprise mechanism, and the IP address, the computer name, the work authority, the network parameter setting and the like of the workstation are managed in a centralized way by adopting an address security binding technology based on the MAC address.
The network management strategy and distribution unit is used for completing the generation, modification, deletion and distribution of the strategy.
The network remote monitoring and maintaining unit is used for remotely monitoring the computer output equipment.
And the intrusion monitoring and safety early warning unit is used for alarming when the computer is accessed to the unauthorized external equipment.
And the user identity authentication module is the most important defense line for ensuring the information safety. The user identity authentication is used for solving the problem that the physical identity and the digital identity of the user correspond to each other, so that the basis of authority management is provided for other security management systems.
If no effective identity authentication means exists, the identity of an authorized visitor can be easily forged, an information security protection strategy is established by taking users as objects through a reliable identity authentication mechanism, and a safe information leakage prevention system can be established by taking security measures such as authority management, role definition, system tracking logs and the like aiming at each user.
The system specifically comprises a physical identity authentication unit and a digital identity authentication unit, wherein the physical identity authentication unit is used for identifying human body characteristics of users, and the digital identity authentication unit is used for setting each user to be in different authority management so as to access files with different security levels.
And the data encryption protection module comprises an encryption unit and an identification unit, and the encryption unit is used for carrying out forced automatic encryption on the files on the enterprise computer.
The identification unit is used for identifying the external equipment which is not authenticated by the administrator and forbidding the external equipment which is not authenticated by the administrator to access the system.
The purpose of encrypting and protecting the data is to prevent information from leaking through an internal network or an external network intentionally or sparsely by users in an organization, so that the encrypted data file cannot be accessed and used after leaving the enterprise computer. Because most of the important data files of the enterprise exist in the form of electronic documents, the files on the computer of the enterprise are forcibly and automatically encrypted by adopting a process forced encryption technology, so that the encrypted drawing files and document files leave the computer of the enterprise and cannot be used, thus some core data in the enterprise are firmly limited in the internal environment of the enterprise, and the security of some core data in the enterprise is ensured. The external equipment which is not authenticated by the administrator is identified, and the external equipment which is not authenticated by the administrator is prohibited from accessing the system, so that the safety of the whole system is ensured.
Meanwhile, the invention also comprises a database server, wherein the database server is used as a data center of the whole system and is responsible for realizing the storage, backup and management of various data and information in the system, and the MSSQLServer2000/2005 database system is adopted, and is mainly used for receiving the setting information of a system administrator from the management end and then distributing the setting information to the client end for realization.
The SQL Server adopts secondary security verification, login verification and permission verification of database user accounts and roles. SQL Server supports two authentication modes: windows NT authentication and SQL Server authentication. Version 7.0 supports multiple types of roles, and the introduction of the concept of the role facilitates the management of the authority and also enables the distribution of the authority to be more flexible.
SQL Server provides a predefined Server and database role for common administrative functions that can easily grant a selected set of permissions to a particular user. The SQL Server can run on different operation platforms and support various different types of network protocols such as TCP/IP, IPX/SPX, Apple Talk and the like. The software running platform of the SQL Server at the Server end is Windows NT, Windows9x, and at the client end can be Windows3.x, Windows NT, Windows9x, or systems developed by other manufacturers such as Unix, Apple Macintosh, etc.
Microsoft's SQL Server is a perfect client/Server system. The SQL Server needs to be installed on the platform of Windows NT, and the Windows NT can support the platforms such as Intel 386, Power PC, MIPS, Alpha PC and RISC, etc., which makes the SQL Server have sufficient Power and function.
The database application programs adopted in the method are all based on SQL Server, ODBC and standard SQL query can be very simply transplanted to any database supporting ODBC, such as: oracle, Informix, Db2 and Access, before reading the relevant ASP database programming techniques, confirms that you are at least familiar with one database management system and can operate the database using standard SQL query language.
SQL Server provides software of Server end, this part needs to be installed on NT Server, SQL Server's client can be installed in many client PC systems, Windows can let client carry on operations such as the establishment, maintenance and access of the database, SQL Server can define 32767 databases at most, each database can define 20 hundred million tables, each table can have 250 fields, the data number of each table is not limited, each table can define 250 indexes, one of them can be Clustered index.
The SQL Server uses a database query language called as Transact-SQL, which is the core of the SQL Server, the Transact-SQL strengthens the original SQL keyword to access, store and process data, the Transact-SQL expands the flow control designation, so that you can easily write powerful storage process, they are stored in the Server and compiled in advance, the execution speed is very fast, the trigger is a special storage process to ensure the integrity of the SQL Server database reference, you can set up the insertion, deletion and update trigger to control the insertion, deletion and update of the data column in the related table, you can also use the Rule (Rule), default (default) and restriction (Constraints) to help apply the new value in the table.
EXAMPLE III
The invention discloses a computer network information safety monitoring system, which comprises a network safety management module, a network planning and address management unit, a network management strategy and distribution unit, a network remote monitoring and maintenance unit and an intrusion monitoring and safety early warning unit, wherein the network safety management module is used for carrying out network planning and computer distribution and monitoring.
The network planning and address management unit is used for planning a network (VLAN) and distributing a computer according to the setting of an enterprise mechanism, and the IP address, the computer name, the work authority, the network parameter setting and the like of the workstation are managed in a centralized way by adopting an address security binding technology based on the MAC address.
The network management strategy and distribution unit is used for completing the generation, modification, deletion and distribution of the strategy.
The network remote monitoring and maintaining unit is used for remotely monitoring the computer output equipment.
And the intrusion monitoring and safety early warning unit is used for alarming when the computer is accessed to the unauthorized external equipment.
And the user identity authentication module is the most important defense line for ensuring the information safety. The user identity authentication is used for solving the problem that the physical identity and the digital identity of the user correspond to each other, so that the basis of authority management is provided for other security management systems.
If no effective identity authentication means exists, the identity of an authorized visitor can be easily forged, an information security protection strategy is established by taking users as objects through a reliable identity authentication mechanism, and a safe information leakage prevention system can be established by taking security measures such as authority management, role definition, system tracking logs and the like aiming at each user.
The system specifically comprises a physical identity authentication unit and a digital identity authentication unit, wherein the physical identity authentication unit is used for identifying human body characteristics of users, and the digital identity authentication unit is used for setting each user to be in different authority management so as to access files with different security levels.
And the data encryption protection module comprises an encryption unit and an identification unit, and the encryption unit is used for carrying out forced automatic encryption on the files on the enterprise computer.
The identification unit is used for identifying the external equipment which is not authenticated by the administrator and forbidding the external equipment which is not authenticated by the administrator to access the system.
The purpose of encrypting and protecting the data is to prevent information from leaking through an internal network or an external network intentionally or sparsely by users in an organization, so that the encrypted data file cannot be accessed and used after leaving the enterprise computer.
Because most of the important data files of the enterprise exist in the form of electronic documents, the files on the computer of the enterprise are forcibly and automatically encrypted by adopting a process forced encryption technology, so that the encrypted drawing files and document files leave the computer of the enterprise and cannot be used, thus some core data in the enterprise are firmly limited in the internal environment of the enterprise, and the security of some core data in the enterprise is ensured. The external equipment which is not authenticated by the administrator is identified, and the external equipment which is not authenticated by the administrator is prohibited from accessing the system, so that the safety of the whole system is ensured.
Meanwhile, the invention also comprises a database server, wherein the database server is used as a data center of the whole system and is responsible for realizing the storage, backup and management of various data and information in the system, and the MSSQLServer2000/2005 database system is adopted, and is mainly used for receiving the setting information of a system administrator from the management end and then distributing the setting information to the client end for realization.
The SQL Server adopts secondary security verification, login verification and permission verification of database user accounts and roles. SQL Server supports two authentication modes: windows NT authentication and SQL Server authentication. Version 7.0 supports multiple types of roles, and the introduction of the concept of the role facilitates the management of the authority and also enables the distribution of the authority to be more flexible.
SQL Server provides a predefined Server and database role for common administrative functions that can easily grant a selected set of permissions to a particular user. The SQL Server can run on different operation platforms and support various different types of network protocols such as TCP/IP, IPX/SPX, Apple Talk and the like. The software running platform of the SQL Server at the Server end is Windows NT, Windows9x, and at the client end can be Windows3.x, Windows NT, Windows9x, or systems developed by other manufacturers such as Unix, Apple Macintosh, etc.
Microsoft's SQL Server is a perfect client/Server system. The SQL Server needs to be installed on the platform of Windows NT, and the Windows NT can support the platforms such as Intel 386, Power PC, MIPS, Alpha PC and RISC, etc., which makes the SQL Server have sufficient Power and function.
The database application programs adopted in the method are all based on SQL Server, ODBC and standard SQL query can be very simply transplanted to any database supporting ODBC, such as: oracle, Informix, Db2 and Access, before reading the relevant ASP database programming techniques, confirms that you are at least familiar with one database management system and can operate the database using standard SQL query language.
SQL Server provides software of Server end, this part needs to be installed on NT Server, SQL Server's client can be installed in many client PC systems, Windows can let client carry on operations such as the establishment, maintenance and access of the database, SQL Server can define 32767 databases at most, each database can define 20 hundred million tables, each table can have 250 fields, the data number of each table is not limited, each table can define 250 indexes, one of them can be Clustered index.
The SQL Server uses a database query language called as Transact-SQL, which is the core of the SQL Server, the Transact-SQL strengthens the original SQL keyword to access, store and process data, the Transact-SQL expands the flow control designation, so that you can easily write powerful storage process, they are stored in the Server and compiled in advance, the execution speed is very fast, the trigger is a special storage process to ensure the integrity of the SQL Server database reference, you can set up the insertion, deletion and update trigger to control the insertion, deletion and update of the data column in the related table, you can also use the Rule (Rule), default (default) and restriction (Constraints) to help apply the new value in the table.
The system comprises a management console, a client, a system administrator, a management console and a management control console, wherein the management console is used for managing and protecting the client, so that the centralized management and the protection of the enterprise user computers are realized, the client logs in and protects the computers through the user identity recognition system combined with hardware, the client is deployed on the enterprise user computers, the management console is used for managing and protecting the client through the management console, so that the centralized management and the protection of the enterprise user computers are realized, and the client logs in and protects the computers through the user identity recognition system combined with the hardware.
The client program deployed by the client on the computer of the enterprise user has undeletability, that is, the user cannot uninstall or stop running the client program without authorization of a system administrator. Client programs deployed on enterprise user computers are undeletable, i.e., users cannot uninstall or stop running a client program without authorization from a system administrator. According to the requirements of system hierarchical structure design, firstly, network security management based on MAC addresses is realized. The network management module has the main functions of performing website planning and computer allocation according to enterprise organization settings, performing centralized management on the IP address, the computer name, the work authority, the network parameter setting and the like of each workstation by adopting an address binding technology of tombs and MAC addresses, and realizing the functions of automatic distribution of network management strategies and remote network maintenance and monitoring.
The main function of the user desktop protection contract taking user identity authentication as the main content is to manage enterprise users according to affiliated mechanisms and departments, adopt a safe login mechanism of double-factor identity authentication, realize user safe login by setting safety strategies such as attributes, safety right levels and the like for the users and combining a client system, and ensure the authenticity of user identity authentication.
The encrypted storage and access module of data is relatively independent of one functional module. The key point is to realize the forced encryption of the data information, so that the encrypted data file can not be accessed and used after leaving the enterprise computer. Because data encryption is an independent technical field, mature process encryption products are available for enterprises in the market.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the scope of the claims of the present invention.

Claims (10)

1. A computer network information security monitoring system, comprising:
the network security management module is used for planning a network and distributing and monitoring a computer;
the user identity authentication module is used for identifying the physical identity and the digital identity of the user;
and the data encryption protection module is used for carrying out forced automatic encryption on the file on the enterprise computer, identifying the external equipment which is not authenticated by the administrator and forbidding the external equipment which is not authenticated by the administrator to access the system.
2. The computer network information safety monitoring system according to claim 1, characterized in that: the network security management module comprises: the system comprises a network planning and address management unit, a network management strategy and distribution unit, a network remote monitoring and maintenance unit and an intrusion monitoring and safety early warning unit.
3. The computer network information safety monitoring system according to claim 2, characterized in that: the network planning and address management unit is used for carrying out centralized management on the IP address, the computer name, the work authority, the network parameter setting and the like of the workstation.
4. The computer network information safety monitoring system according to claim 2, characterized in that: the network management strategy and distribution unit is used for completing the generation, modification, deletion and distribution of the strategy.
5. The computer network information safety monitoring system according to claim 2, characterized in that: the network remote monitoring and maintaining unit is used for remotely monitoring the computer output equipment.
6. The computer network information safety monitoring system according to claim 2, characterized in that: and the intrusion monitoring and safety early warning unit is used for alarming when the computer is accessed to the unauthorized external equipment.
7. The computer network information safety monitoring system according to claim 1, characterized in that: the user identity authentication module comprises a physical identity authentication unit and a digital identity authentication unit, wherein the physical identity authentication unit is used for identifying human body characteristics of users, and the digital identity authentication unit is used for setting each user to be in different authority management so as to access files with different security levels.
8. The computer network information safety monitoring system according to claim 1, characterized in that: the data encryption protection module comprises an encryption unit and an identification unit, wherein the encryption unit is used for forcibly and automatically encrypting files on the enterprise computer, and the identification unit is used for identifying the external equipment which is not authenticated by the administrator.
9. The computer network information safety monitoring system according to claim 1, characterized in that: the system also comprises a database server which is used for storing, backing up and managing the data and the information in the system.
10. The computer network information safety monitoring system according to claim 9, wherein: the system comprises a management console, a client and a system administrator, wherein the management console is used for managing and protecting the client, the client is deployed on an enterprise user computer, the system administrator manages and protects the client through the management console so as to realize the centralized management and protection of the enterprise user computer, and the client performs login protection on the computer through a user identity recognition system combined with hardware.
CN202011429273.XA 2020-12-09 2020-12-09 Computer network information safety monitoring system Pending CN112364328A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011429273.XA CN112364328A (en) 2020-12-09 2020-12-09 Computer network information safety monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011429273.XA CN112364328A (en) 2020-12-09 2020-12-09 Computer network information safety monitoring system

Publications (1)

Publication Number Publication Date
CN112364328A true CN112364328A (en) 2021-02-12

Family

ID=74535149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011429273.XA Pending CN112364328A (en) 2020-12-09 2020-12-09 Computer network information safety monitoring system

Country Status (1)

Country Link
CN (1) CN112364328A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113656479A (en) * 2021-08-18 2021-11-16 国网北京市电力公司 Data processing method and device
CN115378646A (en) * 2022-07-14 2022-11-22 刘书凯 Network security monitoring system for computer communication
CN116232770A (en) * 2023-05-08 2023-06-06 中国石油大学(华东) Enterprise network safety protection system and method based on SDN controller

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113656479A (en) * 2021-08-18 2021-11-16 国网北京市电力公司 Data processing method and device
CN115378646A (en) * 2022-07-14 2022-11-22 刘书凯 Network security monitoring system for computer communication
CN116232770A (en) * 2023-05-08 2023-06-06 中国石油大学(华东) Enterprise network safety protection system and method based on SDN controller

Similar Documents

Publication Publication Date Title
CN111709056B (en) Data sharing method and system based on block chain
CN112364328A (en) Computer network information safety monitoring system
CN111064718B (en) Dynamic authorization method and system based on user context and policy
CN101827101A (en) Information asset protection method based on credible isolated operating environment
CN109684866A (en) A kind of safe USB disk system for supporting multi-user data to protect
CN109766711A (en) A kind of method of safety management database
CN102970317A (en) Safety design scheme of private cloud storage system
Thuraisingham et al. Extended RBAC-based design and implementation for a secure data warehouse
Alawneh et al. Defining and analyzing insiders and their threats in organizations
KR101025029B1 (en) Implementation method for integration database security system using electronic authentication
Nanda et al. Oracle Privacy Security Auditing: Includes Federal Law Compliance with HIPAA, Sarbanes Oxley and the Gramm Leach Bliley Act GLB
CN202218262U (en) Safety management system for internal network information
CN108600178A (en) A kind of method for protecting and system, reference platform of collage-credit data
Zaman et al. Self-protection against insider threats in DBMS through policies implementation
CN111291400A (en) Financial data protection system based on block chain
Kadebu et al. A security requirements perspective towards a secured nosql database environment
Yuan et al. A fine-grained access control method based on role permission management
Batra et al. Autonomous multilevel policy based security configuration in distributed database
Priscakova et al. Model of solutions for data security in cloud computing
Kaushik et al. A review of efficient data utilization schemes in cloud computing
Jaidi Advanced access control to information systems: Requirements, compliance and future directives
Langmead Comparative Evaluation of Access Control Models
Zhao et al. The data security problems discussion in application of library service platform
Bhatnagar Security in Relational Databases
Khodadadi et al. Privacy Issues and Protection in Secure Data Outsourcing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210212