需要金币:1000 个金币 | 资料包括:完整论文 | ||
转换比率:金额 X 10=金币数量, 例100元=1000金币 | 论文字数:11659 | ||
折扣与优惠:团购最低可5折优惠 - 了解详情 | 论文格式:Word格式(*.doc) |
摘要:安全问题伴随着信息技术的发展而发展。长期以来,针对外部侵略的防范措施在不断发现和改进,然而忽略了可能存在的内部的安全问题,例如移动存储设备的使用。 移动存储设备的安全使用尚未有机制约束,计算机中的信息可以通过移动存储设备随身携带,而移动存储设备易丢失;此外,移动存储设备可被用为病毒等的传播媒介,将破坏性病毒等带入计算机以达到破坏信息、系统等目的。因此,移动存储设备的安全管理迫在眉睫。 本文介绍了此课题的研究背景和研究现状,详细介绍了移动存储设备的安全隐患。并针对这一安全问题,提出了对移动存储设备的权限管理进行研究,给出了权限管理的设计方案,并详细介绍和分析了该方案下整体设计架构和各部分的工作流程。此外,本文还给出了关键技术和软件实现的核心代码,以及软件运行部分主要功能的界面截图。最后,本文分析了在此安全机制下移动存储设备仍然存在的不足和有待进一步改善的地方。 关键词:移动存储设备,安全管理,权限管理,文件加密解密,认证
Abstract:Security problems develop with the development of information technology. Long-term since, the preventive measures against external aggression is discovering and improved, but ignore the possible existence of internal security issues, such as the use of mobile storage devices. Mobile storage devices′s safety use have not been protected, the computer information through mobile storage equipment can carry easily,and mobile storage equipment easily lost ; In addition, mobile storage equipment can be used for virus medium of communication, will take destructive virus into computer in order to achieve such goal damaging information, system. Therefore, mobile storage equipment′s safety management is imminent. This paper introduces this topic research background and research status, and detailed introduces the mobile storage equipment safety hazard. To solve this problem, this paper proposes a security for mobile storage equipment rights management conducts the research, has produced rights management design scheme, and detailed introduction and analysis under the scheme design framework and each part of the whole flow of work. In addition, this paper also gives a key technology and software realization of the core code, and software running main functions of the interface partial screenshot. Finally, the paper also analyzed that in this security mechanism, mobile storage devices are still have deficiencies and further improve place. Key words: Mobile storage equipment, safety management, rights management, file encrypt, decrypt, authentication
|