CN114676455A - Information security monitoring system based on project management - Google Patents

Information security monitoring system based on project management Download PDF

Info

Publication number
CN114676455A
CN114676455A CN202210260360.XA CN202210260360A CN114676455A CN 114676455 A CN114676455 A CN 114676455A CN 202210260360 A CN202210260360 A CN 202210260360A CN 114676455 A CN114676455 A CN 114676455A
Authority
CN
China
Prior art keywords
project
information
content
node
public
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210260360.XA
Other languages
Chinese (zh)
Other versions
CN114676455B (en
Inventor
田卫红
石联柱
佘永阳
张立
谢树新
肖忠良
李�权
莫锋
从丽丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Loudi Lezhu Intelligent Technology Co ltd
Loudi Xiaoxiang Vocational College
Original Assignee
Loudi Lezhu Intelligent Technology Co ltd
Loudi Xiaoxiang Vocational College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Loudi Lezhu Intelligent Technology Co ltd, Loudi Xiaoxiang Vocational College filed Critical Loudi Lezhu Intelligent Technology Co ltd
Priority to CN202210260360.XA priority Critical patent/CN114676455B/en
Publication of CN114676455A publication Critical patent/CN114676455A/en
Application granted granted Critical
Publication of CN114676455B publication Critical patent/CN114676455B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06313Resource planning in a project environment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The invention discloses an information security monitoring system based on project management, which relates to the technical field of information security, and is characterized in that each plan node of a project is monitored, so that when the project content of each plan node is checked, all persons capable of checking are persons with checking authority, and the phenomena that the project content is leaked or the project content is tampered by unknown persons are avoided; meanwhile, by the monitoring mode, the change of the project content can be traced, and because each plan node in the project is independent, a corresponding responsible person can be quickly found when the project is abnormal, and the problem of unclear project responsibility is avoided; and the authority of the node responsible person corresponding to the planning node in each project is further limited, so that the encrypted content of the project can be prevented from being leaked by internal personnel, and the information security of the project content is further improved.

Description

Information security monitoring system based on project management
Technical Field
The invention relates to the technical field of information safety, in particular to an information safety monitoring system based on project management.
Background
The project management refers to that an enterprise engaged in project management (hereinafter referred to as a project management enterprise) is entrusted by a proprietor, and performs management and service in the whole process or in a plurality of stages on behalf of the proprietor on the organization of the project according to contract agreement (some enterprises have own construction organizations, build and manage own project by themselves, and belong to the project management range, management mode and process reference project enterprises), wherein the project is a project taking project construction as a carrier and is a disposable project construction task taken as a managed object.
In the process of project implementation, strict requirements are placed on the confidentiality of project content needing to be confidential, in the existing project management, the authority and responsibility division of responsible persons of different nodes of the project is not clear, so that information of the project is easy to leak internally, the responsibility of the project cannot be traced, how to enable the project content to be safer, the responsibility division of each node of the project is more clear, the problem to be solved is that, and an information security monitoring system based on the project management is provided.
Disclosure of Invention
The invention aims to provide an information security monitoring system based on project management.
The purpose of the invention can be realized by the following technical scheme: the information safety monitoring system based on project management comprises a monitoring center, wherein the monitoring center is in communication connection with a data acquisition module, a data processing module and a safety protection module;
the data acquisition module is used for acquiring basic information of project management and acquiring the plan content of each project and the corresponding plan node information of the project plan content;
in the process of the project, the progress of the project is updated in real time by a manager according to the actual completion condition of the project;
the data processing module is used for processing the content of each project in the basic information of project management, completing the classification of the project content, establishing a first information verification port and a second information verification port, and respectively verifying users needing to enter a non-public project storage interval and a part of public project storage intervals;
the safety protection module is used for applying safety protection measures to the project according to different states of the non-public project or the partial public project.
Further, the basic information of the project management comprises the number of managed projects, the name of each project, the state of each project and basic information of project management personnel;
The states of the items include an uninitiated state, an in-progress state, and a completed state.
Further, the process of updating the progress of the project by the manager includes:
and respectively establishing a data entry port uniquely linked with the corresponding project according to each different project, carrying out information verification on the management personnel through the data entry port, and after the information verification on the management personnel is completed through the data entry port, the management personnel enter the progress data of the project into the data entry port.
Further, the process of the data entry port for information verification of the administrator includes:
the manager performs identity verification through the data recording port, and if the manager passes the identity verification, the manager enters the monitoring center through the data recording port;
marking the project selected by a manager after the manager enters the monitoring center, and acquiring the plan node of the project;
and acquiring a node responsible person corresponding to the planning node, and if the node responsible person corresponding to the planning node is the manager, the manager updates the project progress data on line through a data entry port.
Further, the process of classifying the item by the data processing module includes:
Retrieving the content of each item, and acquiring the coverage rate of the encrypted content in the content of the item;
classifying the items into open items, non-open items and partial open items according to the obtained coverage rate;
respectively establishing a corresponding non-public item storage interval, a part of public item storage intervals and a public item storage interval according to the type of each item;
and verifying the item content in the non-public item storage interval and the partial public item storage interval.
Further, the process of the first information authentication port authenticating the user who needs to enter the non-public item storage interval includes:
reading the basic information of the node responsible person of each plan node in each non-public project, and respectively establishing corresponding responsible person information sub-libraries;
granting personal verification information to all responsible persons in the responsible person information sub-library;
reading the project progress of each non-public project, and locking a project plan node corresponding to the project progress according to the project progress;
the user inputs personal authentication information through the information authentication port, and whether the user belongs to the principal information sub-library of any project in the non-public project storage interval is judged according to the input personal authentication information.
Further, the authentication process of the second information authentication port to the user who needs to enter the partial public item storage interval includes: and marking the item content to be checked by the verified user, judging whether the marked item content is encrypted content, if so, acquiring the information of a responsible person of a plan node to which the encrypted content belongs, matching the information of the responsible person with the user, and selecting whether the user is allowed to check the item content according to a matching result.
Further, the process of applying security protection measures to the item by the security protection module comprises:
when the project is in an un-started state or an ongoing state, when a node responsible person corresponding to a planning node to which the encrypted content in the project belongs enters the system, generating an operation log according to all operation contents of the node responsible person in the system; after the node responsible person enters the system, when the node responsible person operates the encrypted content in the project, the part related to the encrypted content cannot be exported to the system;
when the project is in the finished state, when the project is changed from the in-progress state to the finished state, the nodes corresponding to all planning nodes in the project cannot modify the content of the project again.
Compared with the prior art, the invention has the beneficial effects that: by monitoring each plan node of the project, when the project content of each plan node is viewed, all the persons capable of viewing are persons with viewing authority, so that the phenomenon that the project content is leaked or the project content is tampered by unknown persons is avoided; meanwhile, the change of the project content can be traced through the monitoring mode, and because each plan node in the project is independent, a corresponding person of responsibility can be quickly found when the project is abnormal, so that the problem of uncertain project responsibility is avoided; and the authority of the node responsible person corresponding to the planning node in each project is further limited, so that the encrypted content of the project can be prevented from being leaked by internal personnel, and the information security of the project content is further improved.
Drawings
Fig. 1 is a schematic diagram of the present invention.
Detailed Description
As shown in fig. 1, the information security monitoring system based on project management includes a monitoring center, wherein the monitoring center is in communication connection with a data acquisition module, a data processing module and a security protection module;
the data acquisition module is used for acquiring basic information of project management, wherein the basic information of project management comprises the number of managed projects, the name of each project, the state of each project and basic information of project management personnel;
The states of the items include an uninitiated state, an in-progress state, and a completed state;
acquiring basic information of a manager associated with each project through a data acquisition module, wherein the basic information of the manager comprises the following steps: name, gender, age, face photo and real-name authenticated mobile phone number;
acquiring the plan content of each project and acquiring the corresponding plan node information of the project plan content;
the plan node information comprises project plan completion progress, plan node time and a node responsible person;
and uploading the basic information of the project management acquired by the data acquisition module to a monitoring center for storage.
It is further noted that, in the implementation process, each planning node is independent of another planning node;
it should be further explained that, in the specific implementation process, in the process of the project being performed, the manager updates the progress of the project in real time according to the actual completion condition of the project, and the specific process includes:
respectively establishing a data entry port uniquely linked with a corresponding project according to each different project, carrying out information verification on management personnel through the data entry port, and after the information verification on the management personnel is completed through the data entry port, the management personnel enter progress data of the project into the data entry port;
It should be further explained that, in the implementation process, the process of the data entry port performing information verification on the administrator includes:
the manager carries out identity verification through the data input port, and if the manager passes the identity verification, the manager enters the monitoring center through the data input port;
marking a project selected by a manager after the manager enters a monitoring center, and acquiring a plan node of the project;
and acquiring a node responsible person corresponding to the planning node, and if the node responsible person corresponding to the planning node is the manager, the manager updates the project progress data on line through the data entry port.
It should be further explained that, in the specific implementation process, each project is provided with a project chief responsible person, and the project chief responsible persons have the same authority of the responsible person corresponding to each planning node at the same time, that is, the project chief responsible person can perform online operation on the project content of each planning node;
the data processing module is used for processing the content of each project in the basic information of project management, and the specific process comprises the following steps:
classifying all the items, importing the content of each item to different storage positions according to the item types, wherein the process of classifying the items specifically comprises the following steps:
Retrieving the content of each item, acquiring whether the content of the item has encrypted content, and setting a corresponding item type label for the item according to the coverage rate of the encrypted content;
when the encrypted content exists in the project, acquiring the coverage rate of the encrypted content in all the content of the project, and marking the coverage rate of the encrypted content in the project as FG;
when all the content of an item is encrypted, namely FG is 100%, the item is marked as a non-public item;
when all the content in the item is partially encrypted, namely 0 < FG < 100%, the item is marked as a partially open item;
when there is no encrypted content in all content in an item, i.e. FG equals 0, then the item is marked as a public item;
respectively establishing a corresponding non-public item storage interval, a part of public item storage intervals and a public item storage interval according to the type of each item;
verifying the item contents in the non-public item storage interval and part of the public item storage intervals, wherein the specific process comprises the following steps:
establishing a first information verification port, and verifying a user needing to enter a non-public project storage interval through the first information verification port;
Establishing a second information verification port, and verifying users needing to enter a part of public project storage intervals through the second information verification port;
the process of the first information verification port for verifying the user needing to enter the non-public item storage interval comprises the following steps:
reading the basic information of the node responsible person of each plan node in each non-public project, and respectively establishing a responsible person information sub-library according to the acquired basic information of the node responsible person in each non-public project;
granting personal verification information to all the responsible persons in the responsible person information sub-library; it should be further noted that, in the specific implementation process, each individual authentication information is uniquely corresponding to each responsible person;
reading the project progress of each non-public project, and locking a project plan node corresponding to the project progress according to the project progress;
a user inputs personal authentication information through an information authentication port, and whether the user belongs to a principal information sub-library of any project in a non-public project storage interval is judged according to the input personal authentication information;
if the user does not belong to the principal information sub-library of any project in the non-public project storage interval, the user cannot enter the non-public project storage interval;
And if the user belongs to the sub-database of the responsible person of any project in the non-public project storage interval, marking the project corresponding to the sub-database of the responsible person information, and acquiring the plan node to which the user belongs.
The authentication process of the second information authentication port to the user needing to enter a part of the public item storage interval comprises the following steps: and marking the item content to be checked by the user who passes the verification, judging whether the marked item content is encrypted content, if so, acquiring the information of a responsible person of the plan node to which the encrypted content belongs, matching the information of the responsible person with the user, if the matching result is consistent, allowing the user to check the item content, and if not, refusing the user to check the item content.
By monitoring each plan node of the project, all the people who can check the project content of each plan node are people with checking authority when the project content of each plan node is checked, so that the phenomenon that the project content is leaked or the project content is tampered by unknown people is avoided; meanwhile, by the monitoring mode, the change of the project content can be traced, and because each plan node in the project is independent, a corresponding responsible person can be quickly found when the project is abnormal, and the problem of unclear project responsibility is avoided.
The safety protection module is used for applying safety protection measures to the project according to different states of non-public projects or partial public projects, and the specific process comprises the following steps:
when the project is in an un-started state or in an ongoing state, and when a node responsible person corresponding to a planning node to which the encrypted content in the project belongs enters the system, generating an operation log according to all operation contents of the node responsible person in the system; after the node responsible person enters the system, when the node responsible person operates the encrypted content in the project, the part related to the encrypted content cannot be exported to the system, so that the encrypted content of the project which is made by the node responsible person is prevented from being leaked;
when the project is in the finished state, when the project is changed from the in-progress state to the finished state, the nodes corresponding to all planning nodes in the project are in charge of being incapable of modifying the content of the project again.
It should be further noted that, in the specific implementation process, the authority of the node responsible person corresponding to the planning node in each project is further limited, so that the encrypted content of the project can be prevented from being leaked by internal personnel, and the information security of the project content is further improved.
Although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the present invention.

Claims (8)

1. The information security monitoring system based on project management comprises a monitoring center and is characterized in that the monitoring center is in communication connection with a data acquisition module, a data processing module and a security protection module;
the data acquisition module is used for acquiring basic information of project management and acquiring the plan content of each project and the plan node information corresponding to the project plan content;
in the process of the project, the progress of the project is updated in real time by a manager according to the actual completion condition of the project;
the data processing module is used for processing the content of each project in the basic information of project management, completing the classification of the project content, establishing a first information verification port and a second information verification port, and respectively verifying users needing to enter a non-public project storage interval and a part of public project storage intervals;
The safety protection module is used for applying safety protection measures to the project according to different states of the non-public project or part of the public project.
2. The information security monitoring system based on project management of claim 1, wherein the basic information of project management comprises the number of managed projects, the name of each project, the status of each project, and basic information of project management personnel;
the states of the items include an uninitiated state, an in-progress state, and a completed state.
3. The information security monitoring system based on project management as claimed in claim 2, wherein the process of updating the progress of the project by the manager comprises:
and respectively establishing a data entry port uniquely linked with the corresponding project according to each different project, carrying out information verification on the manager through the data entry port, and after the information verification on the manager is completed through the data entry port, the manager enters the progress data of the project into the data entry port.
4. The information security monitoring system based on project management according to claim 3, wherein the process of the data entry port for information verification of the manager comprises:
The manager performs identity verification through the data recording port, and if the manager passes the identity verification, the manager enters the monitoring center through the data recording port;
marking the project selected by a manager after the manager enters the monitoring center, and acquiring the plan node of the project;
and acquiring a node responsible person corresponding to the planning node, and if the node responsible person corresponding to the planning node is the manager, the manager updates the project progress data on line through a data entry port.
5. The information security monitoring system based on project management as claimed in claim 4, wherein the process of classifying the project by the data processing module comprises:
retrieving the content of each item, and acquiring the coverage rate of the encrypted content in the content of the item;
classifying the items into open items, non-open items and partial open items according to the obtained coverage rate;
respectively establishing a corresponding non-public item storage interval, a part of public item storage intervals and a public item storage interval according to the type of each item;
and verifying the item content in the non-public item storage interval and the partial public item storage interval.
6. The project management-based information security monitoring system according to claim 5, wherein the process of the first information authentication port authenticating the user who needs to enter the non-public project storage interval comprises:
reading the basic information of the node responsible person of each plan node in each non-public project, and respectively establishing corresponding responsible person information sub-libraries;
granting personal verification information to all responsible persons in the responsible person information sub-library;
reading the project progress of each non-public project, and locking a project plan node corresponding to the project progress according to the project progress;
the user inputs personal verification information through the information verification port, and whether the user belongs to the responsible person information sub-library of any project in the non-public project storage interval is judged according to the input personal verification information.
7. The information security monitoring system based on project management according to claim 6, wherein the authentication process of the second information authentication port to the user who needs to enter the partial open project storage interval comprises: and marking the item content to be checked by the user passing the verification, judging whether the marked item content is encrypted content, if so, acquiring the information of a responsible person of the plan node to which the encrypted content belongs, matching the information of the responsible person with the user, and selecting whether the user is allowed to check the item content according to the matching result.
8. The system for information security monitoring based on project management according to claim 7, wherein the process of applying security protection measures to the project by the security protection module comprises:
when the project is in an un-started state or an ongoing state, when a node responsible person corresponding to a planning node to which the encrypted content in the project belongs enters the system, generating an operation log according to all operation contents of the node responsible person in the system; after the node responsible person enters the system, when the node responsible person operates the encrypted content in the project, the part related to the encrypted content cannot be exported to the system;
when the project is in the finished state, when the project is changed from the in-progress state to the finished state, the nodes corresponding to all planning nodes in the project cannot modify the content of the project again.
CN202210260360.XA 2022-03-16 2022-03-16 Information security monitoring system based on project management Active CN114676455B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210260360.XA CN114676455B (en) 2022-03-16 2022-03-16 Information security monitoring system based on project management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210260360.XA CN114676455B (en) 2022-03-16 2022-03-16 Information security monitoring system based on project management

Publications (2)

Publication Number Publication Date
CN114676455A true CN114676455A (en) 2022-06-28
CN114676455B CN114676455B (en) 2023-05-02

Family

ID=82074965

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210260360.XA Active CN114676455B (en) 2022-03-16 2022-03-16 Information security monitoring system based on project management

Country Status (1)

Country Link
CN (1) CN114676455B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117094687A (en) * 2023-10-20 2023-11-21 湖南腾琨信息科技有限公司 Equipment refinement management platform based on meta universe and construction method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011048459A (en) * 2009-08-25 2011-03-10 Toshiba Corp System and method for supporting project planning
CN112184177A (en) * 2020-10-13 2021-01-05 广东天衡工程建设咨询管理有限公司 Project supervision method, device and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011048459A (en) * 2009-08-25 2011-03-10 Toshiba Corp System and method for supporting project planning
CN112184177A (en) * 2020-10-13 2021-01-05 广东天衡工程建设咨询管理有限公司 Project supervision method, device and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117094687A (en) * 2023-10-20 2023-11-21 湖南腾琨信息科技有限公司 Equipment refinement management platform based on meta universe and construction method
CN117094687B (en) * 2023-10-20 2024-01-26 湖南腾琨信息科技有限公司 Equipment refinement management platform based on meta universe and construction method

Also Published As

Publication number Publication date
CN114676455B (en) 2023-05-02

Similar Documents

Publication Publication Date Title
CN106599713B (en) A kind of database desensitization system and method based on big data
CN106776141B (en) A kind of backup and recovery system enhanced safely
US11810129B2 (en) Systems and methods for provisioning embedded Internet of Things Universal IDs (IoT UIDs) in Brownfield devices
US20060147043A1 (en) Server, computer memory, and method to support security policy maintenance and distribution
CN104484620B (en) A method of false sales volume and inventory are avoided in pin sales management cloud system fastly
CN110533789B (en) Equipment inspection management method and device based on block chain
EP4178155A1 (en) Blockchain-based certification audit data sharing and integrity verification system, device, and method thereof
CN113495920A (en) Content auditing system, method and device based on block chain and storage medium
US20220239648A1 (en) Systems and methods for an internet of things device registry display
CN114676455B (en) Information security monitoring system based on project management
Singh et al. Designing a Blockchain-Enabled Methodology for Secure Online Voting System
CN116542637B (en) Government platform safety control method based on computer
CN116886409B (en) Network security policy management method based on network slicing
CN112734989A (en) Bluetooth key distribution method of intelligent door lock
CN111666554A (en) Certificate authentication method, device, equipment and storage medium
CN110708156A (en) Communication method, client and server
CN114240349A (en) Ecological environment supervision method and system based on block chain
CN114037576A (en) System and method for allocating academic resources
Pattiyanon et al. Analysis and Enhancement of Self-sovereign Identity System Properties Compiling Standards and Regulations.
Keszthelyi et al. From the IT authorisation to the role-and identity management
CN113343288B (en) Block chain intelligent contract security management system based on TEE
Jekot et al. IT risk assessment and penetration test: Comparative analysis of IT controls verification techniques
CN117313122A (en) Data sharing and exchanging management system based on block chain
CN114139124A (en) Container user authentication platform
CN116150262A (en) Penetration type supervision system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant