Diploma Creating an electronic archive system for the protection of the enterprise

Affiliates: 10,5 $ — how to earn
Pay with:
i agree with "Terms for Customers"
Sold: 0
Refunds: 0

Uploaded: 19.05.2008
Content: 80519062530617.rar (391,27 kB)

Description

ВВЕДЕНИЕ……………………………………………………………………………….5
1 security audit .................................................................. .7
1.1 Analysis of the threats ................................................................................. 7
1.2 Classification of information threats ...................................................... 9
1.3 The informal model of offender ................................................... .10
1.4 Classification of offenders ......................................................... ... 12
1.5 Assessing the level of information system security ........................ ..14
1.6 The results of a security audit ...................................................... ..18
2 ANALYSIS OF OBJECT ........................................................................ ..20
2.1 Description of ........................................................................ ..20
2.2 Objectives of information security systems of electronic archive ..................... .22
3 SELECTION OF REMEDIES ............................................................ .25
3.1 Systems of detection and prevention of attacks .................................... ..25
3.1.1 Intrusion Detection Systems ...................................................... ... 25
3.1.1.1 The method of gathering information ............................................. ... 25
3.1.1.2 The method of analyzing information ............................................. .27
3.1.1.3 The method of responding to threats ....................................... ..27
3.1.2 Systems prevent attacks ................................................... .28
3.1.3 RealSecure Server Sensor ............................................................ 29
3.1.4 RealSecure Desktop .................................................................. .32
3.2 Protection from leaks of confidential data at the level of 35 workstations ...
3.2.1 leakage channels ........................................................................ .35
3.2.2 SmartLine DeviceLock ............................................................... .37
3.3 Protection of confidential information during transmission over communications channels ... ..39
3.3.1 VPN .................................................................................... ..39
Outpost 3.3.2 ................................................................................. .45
3.4 Digital Signature ......................................................... 51
3.4.1 The technology of digital signature .................................... 51
3.4.2 Crypto CSP ..................................................................... ..54
3.5 Means of security analysis ...................................................... .56
3.5.1 Purpose and classification tools for analyzing security ............ ..56
3.5.2 XSpider ................................................................................. .59
4 COMPLEX measures to protect electronic information АРХИВЕ………………………………………………………………………………….61
4.1 Legal measures ........................................................................... ..61
4.2 Technical measures ........................................................................ .62
4.3 Arrangements .................................................................. 63
5 ................................................ 65 FEASIBILITY STUDY
6 LEGAL JUSTIFICATION ............................................................ 71
ЗАКЛЮЧЕНИЕ………………………………………………………………………...76
REFERENCES ...................................................... .77
ПРИЛОЖЕНИЯ………………………………………………………………………...81

Additional information

The diploma is written on konretno company, the name of the predpritiya everywhere replaced by XXXXX. Also ruled out the list of information constituting confidential information (Appendix 1) and the number and date of internal regulations of the enterprise. In the protection of the diploma commission it was awarded as the most economical of the thoroughly calculated and the best in the group. Risk analysis is subjective, but held nezapisimo three people, after the data were averaged. The authorship belongs to me.

Feedback

0
No feedback yet.
Period
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at support@plati.com the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)