The Design of Protection Security System of University Educational Information System

Article Preview

Abstract:

As the important part of the university digital campus,establishing the whole security and protection financial information system in the educational information system is an important problem in the current digital campus. This paper systematically and methodically considers the full range of university needs and educational information network security features, so as to achieve overall system security with on a comprehensive network security plan and the implementation of modular sub-network area. In this paper, security operation system can ensure the security of the application environment, and data backup technologies ensure the transmission and storage of classified data security.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 962-965)

Pages:

3063-3066

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] H.Q. Wang, J.B. Lai, Y. Liang, X.W. Liu. The classification, design and placement of security sensor for network security situational awareness system. International Conference on Internet Computing in Science and Engineering, 321-324(2008).

DOI: 10.1109/icicse.2008.62

Google Scholar

[2] J.D. Zhu, L. Liu. University network security risk assessment based On fuzzy analytic hierarchy process. International Conference on Computer Application and System Modeling, 9: 213-217(2010).

DOI: 10.1109/iccasm.2010.5623049

Google Scholar

[3] R Li, Y Yang. Network security assessment based on fuzzy sets and rough sets. The 5th International Conference on Wireless Communications, Networking and Mobile Computing, 1-4 (2009).

DOI: 10.1109/wicom.2009.5302948

Google Scholar

[4] X.Z. Chen, Q.H. Zheng, X.H. Guan. Quantitative Hierarchical Threat Evaluation Mode for network Security, Journal of Software, 17(4): 885-897(2006).

Google Scholar

[5] L.J. Wang, B Wang, Y.J. Peng. Research the information security risk assessment technique based on Bayesian network. The 3rd International Conference on Advanced Computer Theory and Engineering, 3: 600-604(2010).

DOI: 10.1109/icacte.2010.5579740

Google Scholar

[6] D.J. Zhang. Application of gap technology in the social security information system, Electronic Engineer, 33(11): 63(2007).

Google Scholar

[7] Scan Convert. Network security architecture, Beijing: Posts & Telecom Press (2005).

Google Scholar

[8] H Andrew. Analyzing Computer intrusions. University of California. San Diego, CA (1997).

Google Scholar

[9] S Foresti, J Agutter, Y Livnat. Visual correlation of network alerts. Computer Graphics and Applications, 26(2): 48−59 (2006).

DOI: 10.1109/mcg.2006.49

Google Scholar

[10] Y Wei. Network security situation assessment model research. Anhui: University of Science and Technology of China, 8−9 (2009).

Google Scholar