需要金幣:![]() ![]() |
資料包括:完整論文 | ![]() |
![]() |
轉(zhuǎn)換比率:金額 X 10=金幣數(shù)量, 例100元=1000金幣 | 論文字?jǐn)?shù):11659 | ![]() | |
折扣與優(yōu)惠:團購最低可5折優(yōu)惠 - 了解詳情 | 論文格式:Word格式(*.doc) | ![]() |
摘要:安全問題伴隨著信息技術(shù)的發(fā)展而發(fā)展。長期以來,針對外部侵略的防范措施在不斷發(fā)現(xiàn)和改進,然而忽略了可能存在的內(nèi)部的安全問題,例如移動存儲設(shè)備的使用。 移動存儲設(shè)備的安全使用尚未有機制約束,計算機中的信息可以通過移動存儲設(shè)備隨身攜帶,而移動存儲設(shè)備易丟失;此外,移動存儲設(shè)備可被用為病毒等的傳播媒介,將破壞性病毒等帶入計算機以達到破壞信息、系統(tǒng)等目的。因此,移動存儲設(shè)備的安全管理迫在眉睫。 本文介紹了此課題的研究背景和研究現(xiàn)狀,詳細(xì)介紹了移動存儲設(shè)備的安全隱患。并針對這一安全問題,提出了對移動存儲設(shè)備的權(quán)限管理進行研究,給出了權(quán)限管理的設(shè)計方案,并詳細(xì)介紹和分析了該方案下整體設(shè)計架構(gòu)和各部分的工作流程。此外,本文還給出了關(guān)鍵技術(shù)和軟件實現(xiàn)的核心代碼,以及軟件運行部分主要功能的界面截圖。最后,本文分析了在此安全機制下移動存儲設(shè)備仍然存在的不足和有待進一步改善的地方。 關(guān)鍵詞:移動存儲設(shè)備,安全管理,權(quán)限管理,文件加密解密,認(rèn)證
Abstract:Security problems develop with the development of information technology. Long-term since, the preventive measures against external aggression is discovering and improved, but ignore the possible existence of internal security issues, such as the use of mobile storage devices. Mobile storage devices′s safety use have not been protected, the computer information through mobile storage equipment can carry easily,and mobile storage equipment easily lost ; In addition, mobile storage equipment can be used for virus medium of communication, will take destructive virus into computer in order to achieve such goal damaging information, system. Therefore, mobile storage equipment′s safety management is imminent. This paper introduces this topic research background and research status, and detailed introduces the mobile storage equipment safety hazard. To solve this problem, this paper proposes a security for mobile storage equipment rights management conducts the research, has produced rights management design scheme, and detailed introduction and analysis under the scheme design framework and each part of the whole flow of work. In addition, this paper also gives a key technology and software realization of the core code, and software running main functions of the interface partial screenshot. Finally, the paper also analyzed that in this security mechanism, mobile storage devices are still have deficiencies and further improve place. Key words: Mobile storage equipment, safety management, rights management, file encrypt, decrypt, authentication
|