The Design of Information Security Management System in College

被引:0
|
作者
Li, Xinli [1 ]
机构
[1] Beijing Jiaotong Univ, Informat Ctr, Beijing 100081, Peoples R China
关键词
D O I
暂无
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Research shows that with hundreds of application systems, the general colleges and universities have different developers in uneven professional levels, such as professional personnel from outside of the school, from independent departments, and even the students. The operating environment of application system is scattered in a managed way, by cloud services or directly in the office. The various application systems and the complex operating environment in colleges and universities, and some unprofessional developers would make bugs and difficult to manage. Nowadays, the universities have been widely deployed firewalls, intrusion and other network security equipment, so that hackers have been difficult to attack the websites through the traditional network layer. However, due to the widespread bugs of web application, hackers often use them to attack the sites. Thus, it is urgent to develop a set of security management service platform to help the information security administrator manage the basic information, find bugs before the attacker and timely repair. Based on the above reasons and combined with the actual needs, the campus network security management service plat form is designed and developed.
引用
收藏
页码:49 / 52
页数:4
相关论文
共 50 条
  • [41] Constructiaon of Management System on the Enterprise Information Security
    Liu, Qiao-rong
    Kang, Xiao-juan
    [J]. MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 2160 - 2163
  • [42] Information Security Management: A System Dynamics Approach
    Nazareth, Derek L.
    Choi, Jae
    [J]. AMCIS 2012 PROCEEDINGS, 2012,
  • [43] Information Security Emergency Plan Management System
    Lingaraj, K.
    Sreekanth, N.
    Kaja, Moddiudin
    Lokesh, K. M. S.
    Prashanth, Keni
    Nagaveni, V. Biradhar
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 129 - 137
  • [44] AUDIT AND INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION
    Drastich, Martin
    [J]. SBORNIK Z MEZINARODNI VEDECKE KONFERENCE ZNALOSTI PRO TRZNI PRAXI 2012: VYZNAM ZNALOSTI V AKTUALNI FAZI EKONOMICKEHO CYKLU, 2012, : 49 - 52
  • [45] Hospital Information System Management and Security Maintenance
    Wei, Xianmin
    [J]. 2010 INTERNATIONAL CONFERENCE ON BIO-INSPIRED SYSTEMS AND SIGNAL PROCESSING (ICBSSP 2010), 2010, : 100 - 102
  • [46] Architecture of an Intelligent System for Information Security Management
    Jafarov, Zafar
    [J]. 2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2013, : 181 - +
  • [47] Information security management system: Processes and products
    Eloff, MM
    Eloff, JHP
    [J]. SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 193 - 204
  • [48] Design infrastructure of security system in medical information
    Chen, XM
    Zhang, JG
    [J]. JOURNAL OF INFRARED AND MILLIMETER WAVES, 2005, 24 (01) : 71 - 75
  • [49] Development and design of management information system security protocol for wireless sensor network routing
    Ye, Hai
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, INFORMATION AND MEDICINE (EMIM 2015), 2015, 8 : 1337 - 1342
  • [50] College Financial Management System Research and Design
    Song, Xinxin
    [J]. PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, 2016, 43 : 318 - 321