指导
网站地图
澳洲代写assignment 代写英国assignment Assignment格式 如何写assignment
返回首页

新西兰梅西大学作业assignment指导范例—电子政务安全风险与对策研究

论文价格: 免费 时间:2014-07-27 12:38:45 来源:www.ukassignment.org 作者:留学作业网
电子政务是指政府机构运用现代计算机和网络技术,通过网络技术集成进行管理和服务,在互联网上实现政府组织结构和工作流程的重组优化的过程中,网络超越时间和空间及部门之间的空间限制,向全社会提供全面、高质量和效率规范透明,符合国际标准的管理和服务。电子政务是包括黑客入侵和破坏,威胁的病毒广泛传播广播,监视非公开信息和偷窃,恐怖组织网络攻击和肆意破坏,内部人员非法和不规则的操作、网络系统的脆弱,信息产品失控,等一些列的事务。电子政务系统相对于公共信息系统安全需求的重要性和特殊性表现如下:
 
Abstract摘要
 
With the rapid development of information technology, especially the popularization and application of Internet technology, e-government has become one of the most important area of contemporary informationization. Government departments to realize electronic, network and information technology, is beneficial to the government administrative efficiency, improve public services. However, a portion of the e-government system information involving national security and secrets. In the electronic government affair work for the government to bring high efficiency and convenience at the same time, the potential safety risk is becoming more and more high in the system. So, the question of information security becomes the presses for solution of the problems in the construction of e-government. 
 
Government information resources involves a large number of state secret information, e-government system is becoming the main carrier of government information resources, its security and privacy is not only related to the healthy development of e-government and information technology, and is related to national economic security, national defence security and social stability. Along with the changing of government functions, a service-oriented government, transparent government ideas gradually going deeper, the government information publicity is steadily advancing, but the electronic government affairs itself has the characteristics of openness, virtual and network, but also because some staff information literacy, information confidential consciousness, information security management for failing to keep up with, lead to public sector information confidential trued facing a major test. For e-government system of the various security issues, the dissertation analyzes the electronic government affairs system security requirements, this paper introduces the electronic government affairs development process and status, summarizes the security problems of e-government and security system, introduces the several key information security technology in electronic government affairs, expounds the security technology of electronic government affairs. 
 
Key words: electronic government affairs; The electronic government affairs risk countermeasure, e-government 
 
E-government security necessity and present situation 电子政务安全的必要性和现状
 
1.1 the necessity of e-government security protection 
 
E-government refers to government agencies, using the modern computer and network technology, the management and service through the network technology integration, on the Internet to realize the restructuring of the government organization structure and work process optimization, beyond time and space and space restrictions between departments, to the whole society to provide comprehensive, high quality and efficiency specifications transparent, in line with international standards of management and service. E-government is including hacker invasion and destruction, the threat of the virus spread widely broadcast and, spy on non-public information into and stealing, terrorist groups to network attacks and wanton destruction, internal personnel illegal and irregular operations, network system vulnerable, information product out of control, etc. E-government system relative to the common information system security requirements on its importance and particularity: 
 
(1) after the commissioning of the e-government system must ensure its stability, so as to ensure the continuity and connectivity of all kinds of business. 
 
(2) the e-government network information released to the outside world, including the policies, laws and regulations, etc. This information is not tampered with, and distorted; At the same time, the government website collection of all kinds of public feedback information must be safe to send to the relevant government departments. 
 
(3) in the e-government system of circulation of many government official document has the important intelligence, sometimes involving national security, when these information through the network spread if eavesdropping, leak, tampering or forgery, consequence is unimaginable. In 1995, the French navy network system by "hacker" from the general staff, attract the authorities' infinite panic [5]. 
 
1.2 the development of China's e-government status quo 
 
E-government involves the following three areas: business interaction of internal and external mutual unicom, content management, information resources sharing and information publishing system; Represented by document transmission in the network office automation business; With standardized treatment for all the business information systems. The content of e-government is very wide, have different contents of both at home and abroad, according to all levels of government planning project, the electronic government affairs mainly includes three aspects: 
 
1. The government of the government's e-government: electronic policies and regulations system, electronic documents office system, electronic judicial file system, financial management systems, electronic training tutorial system, performance evaluation system, etc. 
 
2. The government e-government between enterprise: import export customs declaration, electronic procurement and bidding, electronic tax, together with information and advisory services. 
 
3. The government e-government between citizens: education services, employment services, health services, social insurance, civil services information registration service, electronic documents query service, etc. 
 
E-government is systems engineering, and shall meet the following three basic conditions: 
 
(1) the electronic government affairs is a capable of handling public affairs related to the government, the integrated system of the internal affairs; 
 
(2) the electronic government affairs is a kind of new, advanced, revolutionary government affairs management system; 
 
(3) rely on electronic information technology hardware e-government system, digital network technology, software technology of comprehensive service system. 
 
On January 1, 2006, the central government portal opening, has had a great repercussions at home and abroad, and fill in the blank of the hierarchy system of Chinese government web site portal, become the iconic landmark in the construction of e-government in China. Rankings are opened on the same day, visits from start of the 1720th to 744th, rapidly in the worldwide popularity index. This electronic information construction is of great significance to the Chinese government affairs, but also made clear to establish unified portal website is to become one of the important trends of e-government. Local governments at all levels, especially in the municipal government portal website directly for the user to provide the service window, make the whole period of "11th five-year plan" period the focus of the government website construction for the administrative examination and approval, transaction management and convenient service, such as the government business. "11th five-year plan" put forward by the electronic government affairs under the state council, the overall framework, the goal is to more than 2010, more than half of the administrative licensing items to realize the online processing. Now government affairs public directories on the Internet, build a transparent, clean and efficient government. , according to the Chinese Internet authorities as of June 2000, in ". Gov. Cn domain name registration "government web site a total of nearly 12000. Currently, 97% of the relevant departments of the state council completed the government website, about more than 90% of the provincial government, nearly 97% of the municipal government, more than 770 k of the government at the county level have their own government website. In recent years the country issued implementation of relevant national informatization development strategy planning, mainly in order to implement the key important supporting planning and special planning, e-government special planning of state and government at all levels are also developed. Electronic government affairs under the state council informatization office of new and high technology group, the national standardization management committee jointly held in Beijing in recent years, the national seminar of e-government information resource catalog system and exchange system "put forward the theme of" government information resource catalog system and exchange system of national standards, technical support environment and application service mode of study and discussion." On the subject, under the advocacy of national informatization leading group proposed that our country should based on unified national e-government network, actively the construction of e-government information resource catalog system and exchange system. The development of e-government is an indispensable link in China's modernization process, is also to speed up the modernization process of China faces new challenges, the government's modernization depends on the information. Our party in the relevant meetings to accelerate informatization especially e-government construction put forward new requirements, clearly put forward to further transform government functions, improve the methods of management, introduce e-government. Accelerate the construction of electronic government affairs, deepen the reform of the administrative system, is the only way to realize the government management modernization. With everything taken into consideration, China's e-government has been developing rapidly in recent years, some areas have equivalent to that of the international advanced level. In today's highly informationization, e-government in improving administrative efficiency, reduce administrative costs at the same time, greatly convenient for administration #p#分页标题#e#
 
On the other side. With the rapid development of e-government of China's social and economic development, especially the development of electronic information has an important meaning, the development of e-government is bound to play a standard role to the development of information technology in all walks of life. China established the goal of the electronic government affairs as a construction of honest, diligent, pragmatic and efficient government. E-government is also the effective means of administrative management, information technology makes the government first impossible things become possible, and do things more efficiently, to implement effective management of the national government played a force to be reckoned with. National overall e-government construction goal of "to the information security as the basis, to the data acquisition and the whole and as the main body of the core, to serve the public e-government development allows us to building of socialism with Chinese characteristics at the same time, a suitable for China's national conditions of informatization construction of the government." But due to the relatively weak, the basis of some aspects of social and economic development is not balanced. Review once upon a time, in the late 1980 s, China's e-government has just started, party and government organs at all levels of office automation (OA), set up the government information office internal network, the move for the application of computer and communication network technology have played an important role in laying; In 1987, the central "office automation conference" held in beidaihe; In 1992, the state council general office issued the head of the national executive authority office decision service system about construction notice, request the government organs at all levels and departments of office automation construction; At the end of 1993 officially launched the "three golden project", namely, jinqiao, Jin Guan and gold card project, focus on construction of information infrastructure, for key industries and departments to provide data and information services; In January, 1999, 48 ministries and commissions under the state council and the office launched a joint in the Chinese government Internet project initiative; In October 2000, the communist party of China clearly put forward of the fifth plenary session of the fifteenth: "cover modernization of global strategic move is vigorously promoting the national economy and social informatization. Using informationization to drive industrialization the backwardness advantage, realize the rapid development of social productive forces". At the end of 2001, the national informationization leadership group first plenary meeting, promoting the construction of electronic government affairs as one of the key project of national informatization. Also by the general office of the state council formulated the national government e-government system of informationalization construction of the e-government five years planning, planning of three to five years to build on the basis of the "three net library" architecture of government informatization goal of e-government system; In August 2002, the general office of the central committee of the communist party of China, together with the general office of the state council issued "about forwarding < national leading group for information technology about guidance for the construction of our country electron government affairs > notice, the definition of e-government network, the network has a clear, the method of e-government network construction become the whole society one of the important link of the informatization and the center content, also marks the e-government has entered the overall development period; N., 2002, the party's 16 big reports emphasize to speed up the transformation government function, transformation of the mode of management, vigorously promote the process of e-government, improve administrative efficiency, reduce administrative cost, establish a fair and transparent, clean and efficient administrative system. ; By 2002 approved the construction of e-government project has reached the "twelve gold". One of as the "gold" project by the ministry of public security of the specific implementation of the "golden shield project" issue has officially launched. Published in 2003 by domestic Chinese e-government blue book aimed to review summarized the development of e-government in China, focused on China's e-government construction and development of policy, strategy, and points out that the management issues profoundly; Summarizes and induces the central and all levels of government in the e-government construction experience, and with foreign e-government construction as an example in this paper, the advantage and experience. In October 2004, when the national informatization leading group held the third meeting offered to advance e-government, promote the transformation of government functions. Accelerate the construction of unified network platform, the realization of the network information resources sharing. Consolidate e-government planning, to further build the basic framework of e-government system. This meeting to promote e-government construction in China 
 
Set to comprehensively promote stage. In 2005 the government information disclosure regulations in the process of legislation, regulations formulated as the important things in the process of the transformation of the government functions, it is a symbol of China's building of transparent government, responsible government important legislation. In recent years, governments at all levels and part of the ministry departments actively introduced measures for the administration of government information publicity for shape rules laid a strong practical base. No matter from the development of e-government standards, or from the government reform and the requirements for economic and social informatization, China's e-government development is still in its infancy, there are still many higher theoretical and practical problems to be solved. [2] 
 
The safe hidden trouble and measures of e-government 电子政务的安全隐患和措施
 
2.1 e-government security hidden danger 
 
E-government safety problems can be divided into the following categories: 
 
1. The information of tampered with 
 
2. Information intercepted and steal 
 
3. The fake information 
 
4. Send and receive a denial 
 
2.2 the e-government system security threats of attack 
 
Since the beginning of design in the Internet, only considering the conveniences, openness, the Internet very frail, most of the network are suffered from internal and external double attack, including the harm of network data in the information and the harm of network equipment. Threats to security of e-government has two aspects of human and human. 
 
1. For the threat. Mainly, such as earthquake, fire and other natural disasters and the damage due to technical limitations, such as the operating system's security hidden danger, the design of the hardware of the holes, etc. 
 
2. The threat of a human. Mainly include internal security threat, passive attack, attack, attack nearby and distribute five types of attacks. 
 
(1) internal security threat is divided in two types: the malicious and not malicious. Malicious attacks is refers to the internal staff for a particular purpose the attack of the implementation of the e-government system used by 191. Didn't mean to attack is to point to the operator due to wrong operation, the important data, such as file sent or stored in the unsafe equipment, and caused severe damage to the data. 
 
(2) the passive attack, mainly including passive attacker monitoring, receiving, recording information on open communications channel. 
 
(3) take the initiative to attack, refers to the attacker's attack on information system implementation, including attempts to avoid safety protection, the introduction of malicious code, and destroy the integrity of the data and system. Such as damage the integrity of the data, unauthorized access, pretend to be legitimate users, insert, and use of malicious code, denial of service attack, etc. 
 
(4 close to attack, the attacker attempts to geographically as close as possible to be attacked in the network, systems and equipment, the purpose is to change, to collect information, or to damage the system. 
 
(5) the distribution of attack, is refers to the attacker in the e-government software and hardware development, production, transportation and installation phase, malicious modify the behavior of the design, configuration. 
 
According to statistics, more than 75% of the safety problem is caused by internal personnel, has become the biggest security hidden danger. These safety concerns may not rely on a single security technology can be solved, must be in the comprehensive analysis of the overall e-government security requirements on the basis of constructing a complete security system. 
 
2.3 e-government security measures 
 
Construction of e-government network security is a systematic project, it should be in accordance with the "unified planning, overall arrangement, unified standards, and supporting each other" principle, to adopt the advanced thought about the construction of the "platform", to avoid repeated construction, give full consideration to the relationship between the whole and local, adhere to the requirements, design method of risk, cost balance. Here, according to the safety of e-government system, the author analyzes the security requirements of e-government system. #p#分页标题#e#
 
1. The need to identify online identity 
 
Because the user server connection with the government on the Internet, the two sides meet each other, the government office to authentication enterprise users or individual user's true identity, cannot appear online fake and fraud; Enterprise users or individual users also want to identify the authenticity of a government web site, cannot because of fake website, and the user cheated, suffer. Online identity authentication is the first security requirements of electronic government affairs, almost all of the electronic government affairs office online first need identification. This requires electronic certificate system. 
 
2. To prevent unauthorized access 
 
To prevent unauthorized access is the access control mechanism. After the identity certification, namely after confirmation of who you are, then we confirm you can do, what kind of access, which means you have what has permission to do things. In e-government systems, different information to different sensitive degree of user access rights also vary. Run in actual network environment, the illegal users or hackers might attempt to fake the identity of the legitimate users enter the system, low permissions of legitimate users may also perform high permissions the user's operation, the illegal user is likely to e-government system caused great risk. Must therefore be to hierarchical control of user access, and has the legal status of users are assigned appropriate access, control its in different business systems have different access rights. In addition, you must be at different levels of user's access to audit. 
 
3. To prevent information disclosure or be destroyed 
 
In e-government systems, a lot of data involving sensitive information, commercial cipher, PuMi information, even a state secret information. These important information in the storage, transport, forwarding, handling and destroyed in the process, must implement various security measures, to prevent unauthorized people, to prevent leaks. This is the electronic government affairs information confidentiality requirements; In the process, also want to prevent information been tampered with and damage, this is the information integrity requirements. In the implementation, can according to the categories of information used in a variety of different mechanisms of encryption measures. 
 
4. Nonrepudiation. E-government systems business office special nature, office on the Internet, both sides meet each other. Therefore, great responsibility, because some involved in the business operation, after the event could not admit once. This to undertake business of denial and sending and receiving side of the past will affect the normal work, also can make accrual cannot implement, lead to chaos in the office online, affect the quality of the work. In the design of e-government security system, to consider adopting certificate mechanism of digital signature, digital signature can solve the problem of the resistance to deny the business, at the same time to match with safety audit method, when disputes arise between trading, through audit and notarization to arbitration, and passed a law to solve such security threats. [1] 
 
Protection and measures of e-government 保护和电子政务的措施
 
3.1 network security protection measures 
 
The network layer is the channels and channels intruders information system, network security must be based on existing hole defects and possible intrusion behavior effectively protection. The main security techniques include terminal access, VLAN technology, firewall, intrusion detection system (defense), etc. 
 
1. The data encryption technology 
 
Data encryption is in order to improve the security and confidentiality of information system and data, to prevent the secret data is destroyed by the external used by one of the main technical means. With the development of information technology, network security and information security has become increasingly aroused people's concern. Countries apart from the law at present., management, strengthen the security protection of data on the outside, from two aspects of technology in software and hardware measures to promote the development of data encryption technology and physical protection technology. According to the function different, data encryption technology is mainly divided into the integrity of the data transmission, data storage, data identification and the four key management technology. 
 
3. The firewall technology 
 
Firewall is between the different security domains, control the flow of information infrastructure, the use of packet filter or agent technology is selected allows for packets, monitoring network activity between security domains, prevent malicious or illegal access, ensure the safety of internal network. 
 
4. The intrusion detection technology (defense) 
 
Intrusion detection (defense) is by collecting information from a number of key node in the network system analysis, if there is a violation of security policy or monitoring network intrusion behavior, provide network monitoring, attack recognition and attack and multiple functions such as security audit, in view of the problems found in the corresponding action (such as disconnected from a network, record the attack process, etc.), is an important part of security defense system. 
 
2.4.3 application security guarantee system 
 
Application system is the core of the electronic government affairs, is the coordination of government departments to carry out online office, business processing and information infrastructure. Application security key is to build a user authentication and authorization system, the application layer of the virus prevention and hole repair system and security audit system. 
 
1. The user authentication and authorization system 
 
User authentication and authorization form is varied, and now is a widely used PKI and directory service technology. PKI is dual key principle was adopted to realize information encryption and authentication, it can provide network application transparently with encryption and digital signatures and the necessary key and certificate management, so as to ensure the security of information on the Internet, true, complete, and non-repudiation. Directory service technology provides all kinds of objects of e-government system hierarchical unified management, to be able to clearly identify the application hierarchy, objects, different users can access the business resources and system resources, implement the corresponding roles and access control list. 
 
2. The virus prevention and hole repair system 
 
Computer viruses and application system vulnerabilities is the most common in e-government system, the biggest security hidden danger threat ', build a comprehensive virus prevention and vulnerability repair system is an important task of the construction of the e-government security system. Every terminal access to the electronic government affairs system to install network anti-virus software and patch repair software, provide cover entire network virus prevention and hole repair strategies, facilities, cut in the overall protection. Shall ensure that the virus code and system vulnerability database updates on a regular basis, to cope with the latest security threats. 
 
3. The security audit system 
 
Security audit based on the information system of information collection, analysis and reporting, to determine the effectiveness of the existing system security control and inspection system of misuse and abuse, verify the current security policy compliance, help safety management personnel to understand, discovery, tracking network security incidents, to provide evidence and analysis of network security. Response to information security audit system operating effectively record and tracking, so that early detection intrusion and sabotage, stop and prevent the happening of the computer crime. 
 
2.4.4 data security guarantee system 
 
E-government system generally need to collecting, sorting, transmission, statistics, analysis, etc during the process of the corresponding data security classification, and then adopt different for different levels of data security measures. Data security is mainly involves two aspects of data transmission and data storage, data transmission security to prevent data during transmission was illegally obtaining or tampered with, shall, according to security requirements, choose different features, materials and transport scheme (such as electromagnetic leakage using optical fiber, shielded cable, and to prevent transmission data encryption). Data storage security mainly index according to the capacity of disaster and backup. 
 
3.2 encryption technology 
 
In the traditional database system, the power of the database administrator is bigger, he is responsible for the management of the system, such as the allocation of resources, the user authorization system audit, and can query the all information in the database. In addition, if someone buy insiders, even don't know any technology, you just need to use hard disk copy machine, you can easily copy the data, which have a direct threat to information security. Therefore, some departments inside the database encryption. Encryption technology is the most basic security technology, its main function is to provide confidentiality services, but in other security services also use encryption technology and encryption algorithm has 3 kinds: symmetric key system, public key system, and the Hash algorithm. #p#分页标题#e#
 
(1) data encryption technology 
 
Purpose is to transmit the data stream encryption, the commonly used method has two kinds of line at one end and the end encryption. The former without regard to the focus on the source and obtaining-information, is to the confidential information through a variety of lines with different encryption keys to provide security and protection. The latter refers to the information from the sender (automatic encryption, and enter the TCP/P packets back to seal, and then as do not read and do not identify the data through the Internet, when these information once they have arrived at their destination, will automatically be restructuring, decryption, become readable data. 
 
(2) data encryption technology 
 
Purpose is to prevent the data on the storage link compromised, can be divided into ciphertext storage and access control. The former is generally through the encryption algorithm conversion, additional methods such as passwords, encryption module implementation; The latter is the qualification, permissions to users to review and limit, to prevent illegal users access or unauthorized users access data. 
 
(3) identify technology data integrity 
 
Purpose is to people involved in transmission, access, process, identity authentication and related data content, reached the requirements of confidentiality, generally including passwords, keys, identity, in the identification of data, etc, the eigenvalues of the system by comparing the test object input meets the preset parameters, implementation of data security protection. 
 
(4) key management technology 
 
Convenient for using data, data encryption in many occasions focuses on the application to the key, therefore the key tend to be kept secret, the main objects of espionage. The key media: disk, disk, etc. Key technology including key production flow and distribution of save, replace and destroyed on security measures. 
 
3.3 the digital signature and authentication technology 
 
Identity authentication technology, identity authentication and access control is the most basic network security technology (6,, in the network, each user has its legal status, through digital id, data signature, a user name and access password, identity authentication and access control, unauthorized operation will be rejected when information encryption, both can be used to transmit information encryption, also can be used to store information encryption. Can also test 
 
About using public key infrastructure, public key infrastructure for implementing electronic business process or on the Internet, the electronic government reached its mature stage is indispensable and important significance. At the same time, the public key infrastructure is also indispensable in the information age all social economic activities of an infrastructure. Public key infrastructure is a kind of follow the standard key management platform, it can transparently provide for all network applications use the password services such as encryption and digital signatures required keys and certificates of flow. PKI is through the use of public key technology and the digital certificate to ensure that the system of information security and is responsible for the validation of a digital certificate holders identity of a system. A same PKI trust by all participants to (certificate authority), check and verify the identity of the participants by the identity that trust mechanism. [3] 
 
1. The symmetric key system. Mainly there are DES, 3 DES, AES, including AES security and the efficiency of the best. The minimum requirement for 128 - bit symmetric key length. 
 
2. The public key system. Mainly has the RSA and elliptic curve cryptosystem, etc. Good safety of elliptic curve cryptography, encryption, high efficiency, need the bandwidth of the small. In general, the public key encryption is much slower than symmetric key encryption. Such as the RSA is about 99.9% slower than DES. So, often used in the application of symmetric key encryption information, instead of the RSA public key encryption, etc. The symmetric key itself as key was short, efficiency is much higher than that of public key encryption information. In this paper, using special encryption server one reason is that considering the public key and symmetric key encryption efficiency difference. 
 
3. The Hash algorithm. As one-way function, its output is the value of the fixed length, can be used to validate data integrity. In cryptography, cryptographic algorithms use key to encrypt or decrypt messages. The encryption algorithm under the premise of safety, the length of the main factors influencing the intensity of encryption is the key, the key length is too short, the strength of encryption is not enough, but the key length is too long, may bring unnecessary costs, reducing the performance of the system, so a encryption system on the premise of security should choose the appropriate key length. 
 
(1) to transmit information encryption, decryption process 
 
(2 keys and other sensitive information distribution between trusted entities 
 
(3) the encrypted information in the spread of password attack or password may occur in the analysis 
 
The digital signature technology 
 
Digital signature is a method of electronic signature, it itself is a string of Numbers, the process of digital signature, digital signature is characterized by: 
 
1. In terms of signed documents, digital signature files must be signed with the binding together. 
 
2. The signature must be able to pass a public to verify the validation of the algorithm. 
 
3 a good digital signature scheme must be able to resist the copy after repeated use. 
 
So in the applications of digital signature, a good signature scheme need to meet at least the following four conditions: 
 
1. The signer cannot deny their signature afterwards; 
 
2. The recipient can verify the signature, but anyone else can not forge the signature; 
 
3. When both parties about the authenticity of a signature dispute, a third party to solve the dispute between the two sides; 
 
4. Can keep the repeated use of signing messages; 
 
Public key infrastructure PKIP technology as one of the core of information security technology, has developed a lot in, and increasingly extensive application areas. Due to the lack of physical contact through the computer network, makes electronically verify trust relationship is crucial, and the PKI technology is a kind of applicable to the electronic government affairs, electronic transaction password technology, can effectively solve the e-government application of confidentiality, authenticity, integrity, and non-repudiation, and access control security issues, is also the premise of the digital signature technology and basic platform. 
 
Physical isolation technology 
 
Physical isolation technology refers to the internal e-government network does not direct or indirect link to public. The purpose of physical security is to protect the workstation, server, router and other hardware and communications link from natural disasters, man-made destruction and wiretapping attack. Only make the internal e-government network and public physical isolation, to ensure the government's internal information network from the hacker attacks from the Internet. In addition, physical isolation for internal e-government network border clear security, makes the network control, to facilitate internal affairs management. [4] 
 
Summary 总结
 
With the rapid development of information technology, especially the popularization and application of Internet technology, e-government has become one of the most important area of contemporary informationization. In e-government, however, work for the government to bring high efficiency and convenience at the same time, the potential safety risk in the system is becoming more and more high. So, the problem of information security has become a problem to be solved in the construction of e-government. 
 
This article generally describes the present situation of the electronic government affairs and the solution of the hidden danger, the first chapter is a general description of the country's e-government development trend and the need for safety, the second chapter describes the e-government has certain hazards and solutions, to achieve the effect of the questions and answers, the third chapter simply describes the e-government safety precautions. 
 
With the continuous development of electronics and electronic government affairs will appear different problems and potential safety hazard, so in order to eliminate safety hidden trouble, needs further research and discussion. 
 
In the paper is about to finish, I hereby to all care for me and help my teachers and classmates extend the most sincere thanks. #p#分页标题#e#
 
In this graduation design, I learned a lot from guiding Jiang Weixing teacher. He serious and responsible work attitude, rigorous doing scholarly research spirit and profound theoretical level make my benefit bandit shallow. No matter in theory or in practice, give me a lot of help, in this thank him for his patience. In writing papers phase, jiang teacher review our paper, put forward many valuable opinions, without his guidance, we couldn't have finished the project design a better task. 
 
In addition, I also want to thank in the past few years to teach my teacher, their tireless church learned a lot not only let me know, and let I have mastered the art of learning, more taught me to be doing things truth, in this thank you. At the same time, in the process of system development group and classmates gave me a lot of help, thank you here together. 
 
Reference 文献
 
[1] Michael. E. association itman, Herbert. J.M attord. Information security principle [M]. Beijing: tsinghua university Press, 2004. 
 
[2] Zhong Yi. E-government network security design (under). Application and practice, 2004 
 
[3] Duan Yun, shi-min wei, Tang Li. Introduction to information security [M]. Beijing: higher education press, 2003 
 
[4] Bickmore, Robert. ImPlementing a PKI Infonnation Sechnical Report, 2000 
 
[5] wang jianye, zhen-guo zhou, Mr. InternetX. 509 pki in-depth discussion and analysis. The computer Applied research, 2003 (in Chinese) 
 
 
 
 
 
 
此论文免费


如果您有论文代写需求,可以通过下面的方式联系我们
点击联系客服
如果发起不了聊天 请直接添加QQ 923678151
923678151
推荐内容
  • 国外大学怎么写assignm...

    很多即将留学海外或初次留学海外的学子经常会问:国外大学怎么写assignment?其实,assignment并不难写,只要你能够了解并熟悉assignment的......

  • 硕士课程论文格式样本:Pop...

    assignment格式样本:All pop art draws upon modern images of cultural icons, consumer ......

  • 英文Assignment和D...

    英文Assignment和Dissertation的写作细节(珍藏版)-Dissertation大体结构-Dissertation写作思路-Dissertati......

  • 怎么写assignment?

    怎么怎么写assignment?:assignment格式...

  • 麦当劳在澳大利亚的管理问题研...

    本文是麦当劳在澳大利亚的管理问题研究assignment指导。现如今,德管理对全球市场上的公司取得持续发展和长期成功来说是及其重要的。大多数的麦当劳餐厅都提供柜......

  • 从女性黑人说唱音乐中看美国传...

    本文是本站代做的assignment范文,有关女性解放问题。人们都认为黑人女说唱音乐应该不受传统观念的束缚,它应当是创新的、能够促进黑人女性解放的,并且能够提高......

923678151