基于基線化管理的計算機配置核查系統(tǒng)的設(shè)計與實現(xiàn)
[Abstract]:Computer terminal is not only the starting point of network behavior, but also the source of all kinds of attacks. As the network environment becomes more complex and the security situation becomes more serious, it is the focus of government and industry to ensure that computer terminal can operate safely and reliably. This paper originates from the national standard research project, which mainly studies the core configuration of government terminal security (China Government Desktop Core Configuration), which meets the requirements of information system security protection in China. N, CGDCC for short). Through in-depth study of the research results of core configuration at home and abroad, and combined with the business needs of government computer system management, this paper designs and implements a computer configuration verification system based on baseline management. Configuration items are uniformly set up and real-time monitored. This paper begins with the research and development of the core configuration techniques and principles involved in the baseline, transforms the security requirements of computer terminals into a language recognizable by the operating system, and generates the baseline available to the computer configuration verification system. Finally, the system is deployed and tested in the real environment, and the actual application effect of the system is shown. Through the research and design of the computer configuration verification system, the unified security of the computer terminal configuration of the whole network is realized. Strategies and real-time security status monitoring services can effectively improve the level of security protection of computer terminals and improve the operational efficiency of the system.
【學(xué)位授予單位】:中國科學(xué)院大學(xué)(中國科學(xué)院工程管理與信息技術(shù)學(xué)院)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP309;TP311.52
【參考文獻】
相關(guān)期刊論文 前10條
1 劉蓓;許濤;李新友;王嘯天;周欣;;政務(wù)計算機終端核心配置標(biāo)準(zhǔn)研究[J];保密科學(xué)技術(shù);2014年01期
2 宋杰;;基于組策略編輯器設(shè)置的計算機系統(tǒng)攻擊防范技術(shù)[J];計算機光盤軟件與應(yīng)用;2013年23期
3 諶志華;;安全基線管理在企業(yè)中的應(yīng)用[J];計算機安全;2013年03期
4 劉蘭;朱程榮;;政務(wù)終端安全基線管理系統(tǒng)的設(shè)計與實現(xiàn)[J];計算機與現(xiàn)代化;2013年02期
5 劉帥;劉蓓;支朝朋;;政務(wù)終端安全配置關(guān)鍵技術(shù)[J];保密科學(xué)技術(shù);2011年04期
6 許濤;吳亞非;劉蓓;李新友;;我國政務(wù)終端安全桌面核心配置標(biāo)準(zhǔn)研究[J];計算機安全;2010年11期
7 吳志軍;楊義先;;信息安全保障評價指標(biāo)體系的研究[J];計算機科學(xué);2010年07期
8 姜聰;;Windows組策略在網(wǎng)絡(luò)管理中的應(yīng)用[J];計算機與網(wǎng)絡(luò);2010年Z1期
9 朱寬;;政務(wù)內(nèi)網(wǎng)終端安全的系統(tǒng)設(shè)計與實現(xiàn)[J];信息網(wǎng)絡(luò)安全;2010年02期
10 呂瑞霞;賀春林;;關(guān)于Windows下組策略管理的討論[J];電腦知識與技術(shù);2008年31期
,本文編號:2229091
本文鏈接:http://www.sikaile.net/kejilunwen/ruanjiangongchenglunwen/2229091.html