Functions Analysis of Network Terminal Information Security Management and Control
DOI:
https://doi.org/10.54097/fcis.v5i1.11794Keywords:
Information Security, Terminal Control, Data Leakage Prevention, Security PolicyAbstract
With the rapid development and wide application of information technology, the problem of information leakage caused by security threats such as network hackers, viruses, misoperation and hardware failure also appears. The research on network terminal information security management and control system is to solve the above problems. This paper elaborates the system functions from the perspective of three roles: terminal user, policy administrator and system administrator. Through network information security management and control of terminal, all user operations are documented on the computer, real-time monitoring of sensitive information, timely prevention of illegal operations, and effectively solve the problems of security data acquisition, management, monitoring and audit. It improves the real-time response and perception ability of network security protection.
Downloads
References
Liu Shuanglin,Guo Yefang, Shi Yiming, etc. Security Control of Power Grid Bidding Information based on distributed blockchain [J]. Information Technology, 2021(10): 70-74.
Wei Ran;Yao Sheng. Enterprise Financial Risk Identification and Information Security Management and Control in Big Data Environment[J]. MOBILE INFORMATION SYSTEMS. Volume 2021, Issue . 2021.
An Ningyu, Su Li, Tian Ye. Research on 5G Information security risk [J]. Security Science and Technology, 2020(09):8-14.
Xia Junling. Research and Design of multilevel document security Model based on Electronic tags [D]. Xi 'an: Xidian University, 2011.
Liu Lijie. Research on Improving information security level based on desktop Management and Control technology [J]. Science and Technology Innovation and Application, 202,12(09): 162-165.
Xie Bolin, Yu Shunzheng. Application layer real-time active defense system based on application layer protocol analysis. Journal of Computer Science, March 2011.
Du Xiaojie, LIANG Chengdong, Peng Shiqiang,etc. Hierarchical protection evaluation data leak prevention System based on blockchain [J]. Electronic Quality. 2022(10):72-76.
Sheela Gowr. P; Kumar. N. Data Leakage Prevention System: A Systematic Report[J]. International Journal of Recent Technology and Engineering (IJRTE). Volume 8, Issue 4 . 2019. PP 367-377.