CN114676455A - Information security monitoring system based on project management - Google Patents
Information security monitoring system based on project management Download PDFInfo
- Publication number
- CN114676455A CN114676455A CN202210260360.XA CN202210260360A CN114676455A CN 114676455 A CN114676455 A CN 114676455A CN 202210260360 A CN202210260360 A CN 202210260360A CN 114676455 A CN114676455 A CN 114676455A
- Authority
- CN
- China
- Prior art keywords
- project
- information
- content
- node
- public
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q10/06313—Resource planning in a project environment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Abstract
The invention discloses an information security monitoring system based on project management, which relates to the technical field of information security, and is characterized in that each plan node of a project is monitored, so that when the project content of each plan node is checked, all persons capable of checking are persons with checking authority, and the phenomena that the project content is leaked or the project content is tampered by unknown persons are avoided; meanwhile, by the monitoring mode, the change of the project content can be traced, and because each plan node in the project is independent, a corresponding responsible person can be quickly found when the project is abnormal, and the problem of unclear project responsibility is avoided; and the authority of the node responsible person corresponding to the planning node in each project is further limited, so that the encrypted content of the project can be prevented from being leaked by internal personnel, and the information security of the project content is further improved.
Description
Technical Field
The invention relates to the technical field of information safety, in particular to an information safety monitoring system based on project management.
Background
The project management refers to that an enterprise engaged in project management (hereinafter referred to as a project management enterprise) is entrusted by a proprietor, and performs management and service in the whole process or in a plurality of stages on behalf of the proprietor on the organization of the project according to contract agreement (some enterprises have own construction organizations, build and manage own project by themselves, and belong to the project management range, management mode and process reference project enterprises), wherein the project is a project taking project construction as a carrier and is a disposable project construction task taken as a managed object.
In the process of project implementation, strict requirements are placed on the confidentiality of project content needing to be confidential, in the existing project management, the authority and responsibility division of responsible persons of different nodes of the project is not clear, so that information of the project is easy to leak internally, the responsibility of the project cannot be traced, how to enable the project content to be safer, the responsibility division of each node of the project is more clear, the problem to be solved is that, and an information security monitoring system based on the project management is provided.
Disclosure of Invention
The invention aims to provide an information security monitoring system based on project management.
The purpose of the invention can be realized by the following technical scheme: the information safety monitoring system based on project management comprises a monitoring center, wherein the monitoring center is in communication connection with a data acquisition module, a data processing module and a safety protection module;
the data acquisition module is used for acquiring basic information of project management and acquiring the plan content of each project and the corresponding plan node information of the project plan content;
in the process of the project, the progress of the project is updated in real time by a manager according to the actual completion condition of the project;
the data processing module is used for processing the content of each project in the basic information of project management, completing the classification of the project content, establishing a first information verification port and a second information verification port, and respectively verifying users needing to enter a non-public project storage interval and a part of public project storage intervals;
the safety protection module is used for applying safety protection measures to the project according to different states of the non-public project or the partial public project.
Further, the basic information of the project management comprises the number of managed projects, the name of each project, the state of each project and basic information of project management personnel;
The states of the items include an uninitiated state, an in-progress state, and a completed state.
Further, the process of updating the progress of the project by the manager includes:
and respectively establishing a data entry port uniquely linked with the corresponding project according to each different project, carrying out information verification on the management personnel through the data entry port, and after the information verification on the management personnel is completed through the data entry port, the management personnel enter the progress data of the project into the data entry port.
Further, the process of the data entry port for information verification of the administrator includes:
the manager performs identity verification through the data recording port, and if the manager passes the identity verification, the manager enters the monitoring center through the data recording port;
marking the project selected by a manager after the manager enters the monitoring center, and acquiring the plan node of the project;
and acquiring a node responsible person corresponding to the planning node, and if the node responsible person corresponding to the planning node is the manager, the manager updates the project progress data on line through a data entry port.
Further, the process of classifying the item by the data processing module includes:
Retrieving the content of each item, and acquiring the coverage rate of the encrypted content in the content of the item;
classifying the items into open items, non-open items and partial open items according to the obtained coverage rate;
respectively establishing a corresponding non-public item storage interval, a part of public item storage intervals and a public item storage interval according to the type of each item;
and verifying the item content in the non-public item storage interval and the partial public item storage interval.
Further, the process of the first information authentication port authenticating the user who needs to enter the non-public item storage interval includes:
reading the basic information of the node responsible person of each plan node in each non-public project, and respectively establishing corresponding responsible person information sub-libraries;
granting personal verification information to all responsible persons in the responsible person information sub-library;
reading the project progress of each non-public project, and locking a project plan node corresponding to the project progress according to the project progress;
the user inputs personal authentication information through the information authentication port, and whether the user belongs to the principal information sub-library of any project in the non-public project storage interval is judged according to the input personal authentication information.
Further, the authentication process of the second information authentication port to the user who needs to enter the partial public item storage interval includes: and marking the item content to be checked by the verified user, judging whether the marked item content is encrypted content, if so, acquiring the information of a responsible person of a plan node to which the encrypted content belongs, matching the information of the responsible person with the user, and selecting whether the user is allowed to check the item content according to a matching result.
Further, the process of applying security protection measures to the item by the security protection module comprises:
when the project is in an un-started state or an ongoing state, when a node responsible person corresponding to a planning node to which the encrypted content in the project belongs enters the system, generating an operation log according to all operation contents of the node responsible person in the system; after the node responsible person enters the system, when the node responsible person operates the encrypted content in the project, the part related to the encrypted content cannot be exported to the system;
when the project is in the finished state, when the project is changed from the in-progress state to the finished state, the nodes corresponding to all planning nodes in the project cannot modify the content of the project again.
Compared with the prior art, the invention has the beneficial effects that: by monitoring each plan node of the project, when the project content of each plan node is viewed, all the persons capable of viewing are persons with viewing authority, so that the phenomenon that the project content is leaked or the project content is tampered by unknown persons is avoided; meanwhile, the change of the project content can be traced through the monitoring mode, and because each plan node in the project is independent, a corresponding person of responsibility can be quickly found when the project is abnormal, so that the problem of uncertain project responsibility is avoided; and the authority of the node responsible person corresponding to the planning node in each project is further limited, so that the encrypted content of the project can be prevented from being leaked by internal personnel, and the information security of the project content is further improved.
Drawings
Fig. 1 is a schematic diagram of the present invention.
Detailed Description
As shown in fig. 1, the information security monitoring system based on project management includes a monitoring center, wherein the monitoring center is in communication connection with a data acquisition module, a data processing module and a security protection module;
the data acquisition module is used for acquiring basic information of project management, wherein the basic information of project management comprises the number of managed projects, the name of each project, the state of each project and basic information of project management personnel;
The states of the items include an uninitiated state, an in-progress state, and a completed state;
acquiring basic information of a manager associated with each project through a data acquisition module, wherein the basic information of the manager comprises the following steps: name, gender, age, face photo and real-name authenticated mobile phone number;
acquiring the plan content of each project and acquiring the corresponding plan node information of the project plan content;
the plan node information comprises project plan completion progress, plan node time and a node responsible person;
and uploading the basic information of the project management acquired by the data acquisition module to a monitoring center for storage.
It is further noted that, in the implementation process, each planning node is independent of another planning node;
it should be further explained that, in the specific implementation process, in the process of the project being performed, the manager updates the progress of the project in real time according to the actual completion condition of the project, and the specific process includes:
respectively establishing a data entry port uniquely linked with a corresponding project according to each different project, carrying out information verification on management personnel through the data entry port, and after the information verification on the management personnel is completed through the data entry port, the management personnel enter progress data of the project into the data entry port;
It should be further explained that, in the implementation process, the process of the data entry port performing information verification on the administrator includes:
the manager carries out identity verification through the data input port, and if the manager passes the identity verification, the manager enters the monitoring center through the data input port;
marking a project selected by a manager after the manager enters a monitoring center, and acquiring a plan node of the project;
and acquiring a node responsible person corresponding to the planning node, and if the node responsible person corresponding to the planning node is the manager, the manager updates the project progress data on line through the data entry port.
It should be further explained that, in the specific implementation process, each project is provided with a project chief responsible person, and the project chief responsible persons have the same authority of the responsible person corresponding to each planning node at the same time, that is, the project chief responsible person can perform online operation on the project content of each planning node;
the data processing module is used for processing the content of each project in the basic information of project management, and the specific process comprises the following steps:
classifying all the items, importing the content of each item to different storage positions according to the item types, wherein the process of classifying the items specifically comprises the following steps:
Retrieving the content of each item, acquiring whether the content of the item has encrypted content, and setting a corresponding item type label for the item according to the coverage rate of the encrypted content;
when the encrypted content exists in the project, acquiring the coverage rate of the encrypted content in all the content of the project, and marking the coverage rate of the encrypted content in the project as FG;
when all the content of an item is encrypted, namely FG is 100%, the item is marked as a non-public item;
when all the content in the item is partially encrypted, namely 0 < FG < 100%, the item is marked as a partially open item;
when there is no encrypted content in all content in an item, i.e. FG equals 0, then the item is marked as a public item;
respectively establishing a corresponding non-public item storage interval, a part of public item storage intervals and a public item storage interval according to the type of each item;
verifying the item contents in the non-public item storage interval and part of the public item storage intervals, wherein the specific process comprises the following steps:
establishing a first information verification port, and verifying a user needing to enter a non-public project storage interval through the first information verification port;
Establishing a second information verification port, and verifying users needing to enter a part of public project storage intervals through the second information verification port;
the process of the first information verification port for verifying the user needing to enter the non-public item storage interval comprises the following steps:
reading the basic information of the node responsible person of each plan node in each non-public project, and respectively establishing a responsible person information sub-library according to the acquired basic information of the node responsible person in each non-public project;
granting personal verification information to all the responsible persons in the responsible person information sub-library; it should be further noted that, in the specific implementation process, each individual authentication information is uniquely corresponding to each responsible person;
reading the project progress of each non-public project, and locking a project plan node corresponding to the project progress according to the project progress;
a user inputs personal authentication information through an information authentication port, and whether the user belongs to a principal information sub-library of any project in a non-public project storage interval is judged according to the input personal authentication information;
if the user does not belong to the principal information sub-library of any project in the non-public project storage interval, the user cannot enter the non-public project storage interval;
And if the user belongs to the sub-database of the responsible person of any project in the non-public project storage interval, marking the project corresponding to the sub-database of the responsible person information, and acquiring the plan node to which the user belongs.
The authentication process of the second information authentication port to the user needing to enter a part of the public item storage interval comprises the following steps: and marking the item content to be checked by the user who passes the verification, judging whether the marked item content is encrypted content, if so, acquiring the information of a responsible person of the plan node to which the encrypted content belongs, matching the information of the responsible person with the user, if the matching result is consistent, allowing the user to check the item content, and if not, refusing the user to check the item content.
By monitoring each plan node of the project, all the people who can check the project content of each plan node are people with checking authority when the project content of each plan node is checked, so that the phenomenon that the project content is leaked or the project content is tampered by unknown people is avoided; meanwhile, by the monitoring mode, the change of the project content can be traced, and because each plan node in the project is independent, a corresponding responsible person can be quickly found when the project is abnormal, and the problem of unclear project responsibility is avoided.
The safety protection module is used for applying safety protection measures to the project according to different states of non-public projects or partial public projects, and the specific process comprises the following steps:
when the project is in an un-started state or in an ongoing state, and when a node responsible person corresponding to a planning node to which the encrypted content in the project belongs enters the system, generating an operation log according to all operation contents of the node responsible person in the system; after the node responsible person enters the system, when the node responsible person operates the encrypted content in the project, the part related to the encrypted content cannot be exported to the system, so that the encrypted content of the project which is made by the node responsible person is prevented from being leaked;
when the project is in the finished state, when the project is changed from the in-progress state to the finished state, the nodes corresponding to all planning nodes in the project are in charge of being incapable of modifying the content of the project again.
It should be further noted that, in the specific implementation process, the authority of the node responsible person corresponding to the planning node in each project is further limited, so that the encrypted content of the project can be prevented from being leaked by internal personnel, and the information security of the project content is further improved.
Although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the present invention.
Claims (8)
1. The information security monitoring system based on project management comprises a monitoring center and is characterized in that the monitoring center is in communication connection with a data acquisition module, a data processing module and a security protection module;
the data acquisition module is used for acquiring basic information of project management and acquiring the plan content of each project and the plan node information corresponding to the project plan content;
in the process of the project, the progress of the project is updated in real time by a manager according to the actual completion condition of the project;
the data processing module is used for processing the content of each project in the basic information of project management, completing the classification of the project content, establishing a first information verification port and a second information verification port, and respectively verifying users needing to enter a non-public project storage interval and a part of public project storage intervals;
The safety protection module is used for applying safety protection measures to the project according to different states of the non-public project or part of the public project.
2. The information security monitoring system based on project management of claim 1, wherein the basic information of project management comprises the number of managed projects, the name of each project, the status of each project, and basic information of project management personnel;
the states of the items include an uninitiated state, an in-progress state, and a completed state.
3. The information security monitoring system based on project management as claimed in claim 2, wherein the process of updating the progress of the project by the manager comprises:
and respectively establishing a data entry port uniquely linked with the corresponding project according to each different project, carrying out information verification on the manager through the data entry port, and after the information verification on the manager is completed through the data entry port, the manager enters the progress data of the project into the data entry port.
4. The information security monitoring system based on project management according to claim 3, wherein the process of the data entry port for information verification of the manager comprises:
The manager performs identity verification through the data recording port, and if the manager passes the identity verification, the manager enters the monitoring center through the data recording port;
marking the project selected by a manager after the manager enters the monitoring center, and acquiring the plan node of the project;
and acquiring a node responsible person corresponding to the planning node, and if the node responsible person corresponding to the planning node is the manager, the manager updates the project progress data on line through a data entry port.
5. The information security monitoring system based on project management as claimed in claim 4, wherein the process of classifying the project by the data processing module comprises:
retrieving the content of each item, and acquiring the coverage rate of the encrypted content in the content of the item;
classifying the items into open items, non-open items and partial open items according to the obtained coverage rate;
respectively establishing a corresponding non-public item storage interval, a part of public item storage intervals and a public item storage interval according to the type of each item;
and verifying the item content in the non-public item storage interval and the partial public item storage interval.
6. The project management-based information security monitoring system according to claim 5, wherein the process of the first information authentication port authenticating the user who needs to enter the non-public project storage interval comprises:
reading the basic information of the node responsible person of each plan node in each non-public project, and respectively establishing corresponding responsible person information sub-libraries;
granting personal verification information to all responsible persons in the responsible person information sub-library;
reading the project progress of each non-public project, and locking a project plan node corresponding to the project progress according to the project progress;
the user inputs personal verification information through the information verification port, and whether the user belongs to the responsible person information sub-library of any project in the non-public project storage interval is judged according to the input personal verification information.
7. The information security monitoring system based on project management according to claim 6, wherein the authentication process of the second information authentication port to the user who needs to enter the partial open project storage interval comprises: and marking the item content to be checked by the user passing the verification, judging whether the marked item content is encrypted content, if so, acquiring the information of a responsible person of the plan node to which the encrypted content belongs, matching the information of the responsible person with the user, and selecting whether the user is allowed to check the item content according to the matching result.
8. The system for information security monitoring based on project management according to claim 7, wherein the process of applying security protection measures to the project by the security protection module comprises:
when the project is in an un-started state or an ongoing state, when a node responsible person corresponding to a planning node to which the encrypted content in the project belongs enters the system, generating an operation log according to all operation contents of the node responsible person in the system; after the node responsible person enters the system, when the node responsible person operates the encrypted content in the project, the part related to the encrypted content cannot be exported to the system;
when the project is in the finished state, when the project is changed from the in-progress state to the finished state, the nodes corresponding to all planning nodes in the project cannot modify the content of the project again.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210260360.XA CN114676455B (en) | 2022-03-16 | 2022-03-16 | Information security monitoring system based on project management |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210260360.XA CN114676455B (en) | 2022-03-16 | 2022-03-16 | Information security monitoring system based on project management |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114676455A true CN114676455A (en) | 2022-06-28 |
CN114676455B CN114676455B (en) | 2023-05-02 |
Family
ID=82074965
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210260360.XA Active CN114676455B (en) | 2022-03-16 | 2022-03-16 | Information security monitoring system based on project management |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114676455B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117094687A (en) * | 2023-10-20 | 2023-11-21 | 湖南腾琨信息科技有限公司 | Equipment refinement management platform based on meta universe and construction method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011048459A (en) * | 2009-08-25 | 2011-03-10 | Toshiba Corp | System and method for supporting project planning |
CN112184177A (en) * | 2020-10-13 | 2021-01-05 | 广东天衡工程建设咨询管理有限公司 | Project supervision method, device and storage medium |
-
2022
- 2022-03-16 CN CN202210260360.XA patent/CN114676455B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011048459A (en) * | 2009-08-25 | 2011-03-10 | Toshiba Corp | System and method for supporting project planning |
CN112184177A (en) * | 2020-10-13 | 2021-01-05 | 广东天衡工程建设咨询管理有限公司 | Project supervision method, device and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117094687A (en) * | 2023-10-20 | 2023-11-21 | 湖南腾琨信息科技有限公司 | Equipment refinement management platform based on meta universe and construction method |
CN117094687B (en) * | 2023-10-20 | 2024-01-26 | 湖南腾琨信息科技有限公司 | Equipment refinement management platform based on meta universe and construction method |
Also Published As
Publication number | Publication date |
---|---|
CN114676455B (en) | 2023-05-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106599713B (en) | A kind of database desensitization system and method based on big data | |
CN106776141B (en) | A kind of backup and recovery system enhanced safely | |
US11810129B2 (en) | Systems and methods for provisioning embedded Internet of Things Universal IDs (IoT UIDs) in Brownfield devices | |
US20060147043A1 (en) | Server, computer memory, and method to support security policy maintenance and distribution | |
CN104484620B (en) | A method of false sales volume and inventory are avoided in pin sales management cloud system fastly | |
CN110533789B (en) | Equipment inspection management method and device based on block chain | |
EP4178155A1 (en) | Blockchain-based certification audit data sharing and integrity verification system, device, and method thereof | |
CN113495920A (en) | Content auditing system, method and device based on block chain and storage medium | |
US20220239648A1 (en) | Systems and methods for an internet of things device registry display | |
CN114676455B (en) | Information security monitoring system based on project management | |
Singh et al. | Designing a Blockchain-Enabled Methodology for Secure Online Voting System | |
CN116542637B (en) | Government platform safety control method based on computer | |
CN116886409B (en) | Network security policy management method based on network slicing | |
CN112734989A (en) | Bluetooth key distribution method of intelligent door lock | |
CN111666554A (en) | Certificate authentication method, device, equipment and storage medium | |
CN110708156A (en) | Communication method, client and server | |
CN114240349A (en) | Ecological environment supervision method and system based on block chain | |
CN114037576A (en) | System and method for allocating academic resources | |
Pattiyanon et al. | Analysis and Enhancement of Self-sovereign Identity System Properties Compiling Standards and Regulations. | |
Keszthelyi et al. | From the IT authorisation to the role-and identity management | |
CN113343288B (en) | Block chain intelligent contract security management system based on TEE | |
Jekot et al. | IT risk assessment and penetration test: Comparative analysis of IT controls verification techniques | |
CN117313122A (en) | Data sharing and exchanging management system based on block chain | |
CN114139124A (en) | Container user authentication platform | |
CN116150262A (en) | Penetration type supervision system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |