The Design of Information Security Manag

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

2016 International Conference on Education & Educational Research and Environmental Studies (EERES 2016)

ISBN: 978-1-60595-393-9

The Design of Information Security Management System in College


Xinli Li
Beijing Jiaotong University Information Center, 100081
Email: xlli@bjtu.edu.cn

ABSTRACT: Research shows that with hundreds of application systems, the general colleges and universities
have different developers in uneven professional levels, such as professional personnel from outside of the
school, from independent departments, and even the students. The operating environment of application
system is scattered in a managed way, by cloud services or directly in the office. The various application
systems and the complex operating environment in colleges and universities, and some unprofessional
developers would make bugs and difficult to manage. Nowadays, the universities have been widely deployed
firewalls, intrusion and other network security equipment, so that hackers have been difficult to attack the
websites through the traditional network layer. However, due to the widespread bugs of web application,
hackers often use them to attack the sites. Thus, it is urgent to develop a set of security management service
platform to help the information security administrator manage the basic information, find bugs before the
attacker and timely repair. Based on the above reasons and combined with the actual needs, the campus
network security management service plat form is designed and developed.

1 INTRODUCTION administrator to mend. Therefore, it is required to


obtain the relevant details of each application
With the continuous expansion of the scale of system, such as the subordinate units, manager,
campus network, Internet has played an increasingly function of the system, contact information, bugs
important role in the management and teaching of and so on. But these data are stored in different
the school. However, since the construction of application systems, namely: office automation
university information, there are not uniform rules system, vulnerability scanning system, firewall and
and standards, and different departments adopt their some Excel office files. Manual extraction,
own systems, producing various application systems. integration and analysis of these data by school
In addition, a large number of systems are scattered, administrators is inefficient and error prone. With
and it is difficult for school to manage uniformly [1]. this approach, bugs cannot be found timely and the
Due to the lack of management, bugs widespread in scanning is heavy workload. Based on the above
the campus network information system, and the reasons, the campus network security management
complex campus network has many users, making it service platform is designed and developed. This
attacked maliciously[2]. According to the related system integrates heterogeneous data from different
data from bugs patching platform, there are 2868 application systems, and the data are analyzed and
bugs about in 339 colleges and universities from visualized, then reports are made and security
2014 to 2015.Itrisks the campus network security, notifications are issued. The system has been on-line
and in order to fully ensure the application system trial.
security of campus network, colleges and
universities should integrate and manage the relevant
information of the application system with scientific 2 OVERALL SYSTEM DESIGN
methods.
Taking a college as an example, more than 500
information systems run in the campus network, 2.1 System functions
which are distributed on different servers and According to the actual needs of colleges, the
provide different services for different users. In order functions of campus network security management
to protect the security of these application systems, service platform mainly include record management,
the school information security administrator must bugs management, off-campus access management,
monthly scan these systems to find bugs timely, and and security management.
issue safety notice and order the system
49
The record management mainly include the 3 DETAILED SYSTEM DESIGN
integration of record information, modification,
query, deletion and export. The record information
mainly records the basic system information, such as 3.1 Record information management module
system function, IP address, subordinate unit, Integration of record information can be done
manager and so on, to facilitate the information through single import or mass integration. The single
administrator. import requires the information security
The bugs management mainly include integration administrator to manually enter the relevant
about two types of bugs (WEB bugs and system information of the application system, whose
bugs), query of bugs, deletion of bugs, analysis of efficiency is relatively low. It is used for application
bugs and the comprehensive analysis report. system without filing in office automation system.
The off-campus access management can integrate The mass integration is used for the application
information from off campus access to this platform, system filing in office automation system. This
so that the information security administrator can method is based on the implementation of Excel
view and modify off-campus access to each system middleware. The document of Excel format is used
server. as intermediate media of data exchange between
The security management is to generate office automation system and this system. First of
comprehensive analysis report and issue security all, judge whether the record data about to import are
announcement. The bugs of all application systems normative, and modify it if not normative. If it is
are analyzed, and statistics on the distribution of normative, manage the information and extract
campus network bugs is done, which are presented related data. Then make sure whether the record
to the users in the histogram and pie charts. information of this system exists. If there is no
And according to the relevant record information, similar information in the database, then add a
a security rectification notice is issued to the person record to the unique table and the historic table. If it
and his department in charge of the system. exists, update the record information in the unique
table, and add a record in the historic table.
2.2 System architecture design The query of record information can be done
Based on the functions of campus network security through condition query and instant query. Condition
management service platform, this system takes query means that the random combination of IP,
advantage of B/S structure, and the architecture domain name and import time can be used as
diagram is shown in figure 1. The work interface condition to search. Instant query means to enter
used by information security administrator is anything as condition to search for all fields of the
presented through the browser, the main logic part is target data that has been queried. Users can search
shown in the server, and a little part is realized any data they have interest with these two methods.
through the front. For the data having been queried, the user can also
put them in order.
Modification and deletion module means that the
record information can be modified and deleted. The
modified information is updated to the unique table
of the record information, and a record is added in
historic table. When the information is deleted, it is
deleted in unique table and the record in historic
table cannot be deleted to provide resource for the
later data search.
The filing information export module realizes the
function that users can export the record information
in the form of Excel file, and it is convenient for
users to carry on the data statistics and report.
3.2 Bugs information management module
Bugs management module concludes integration of
two types of bugs, query of bugs, deletion of bugs,
analysis of bugs, and comprehensive analysis report.

Figure 1. System Architecture Diagram.

50
table, extract required data, and put them into the
corresponding database table. Bugs information
integration process is shown in Figure 2. First read
the bugs scanning information. The program verify
the scanning information, modify the error data and
verify it again, and extract the qualified. And then
determine whether this bug is a new one. If it is new,
add it to the bugs database, and the number of times
the bug appears is initialized to 1, namely find
count=1. If it is old, add 1 to the counters, namely
find_count+1. After the bugs’ database is updated,
take out the ID bugs and IP fields in the table of the
database, and judge whether it has appeared in the
application system based on these two kinds of
information. If it does not exist, add a record in the
application of the distribution table; if it exists, add 1
to counters in the distribution table, namely
count+1.At the end, the import field is assigned to
the recently discovered bugs time field.
3.3 Information security management module
Information security module includes comprehensive
analysis report, monthly report, and safety notices
and safety knowledge.
Monthly report means that system monthly
analyzes bugs information of all application systems
in subordinate units, and generates a monthly report,
which is composed of safety notices. At first, the
university information security administrator fill out
monthly basic information and click the generate
button, and after the system collects the monthly
basic information, all iterators of subordinate units
Figure 2. Flow chart of leak information integration. are removed. And then determine whether
subordinate unit exists in the iterator. If existing, the
The two types bugs integrated are Web bugs and subordinate and all the host and host bugs
system bugs. The two kind of bugs can be found information should be extracted. Then judge whether
through scanning the server and the system, which the number of host bugs is above zero. If above zero,
comes from the remote security assessment system analyze the bugs and generate security notice. If not
of the green alliance. Due to the restriction of the above zero, do not generate notice. Then go on
authority, this system cannot get the data directly judging whether there is subordinate unit in iterator,
from the scan result database. Since bugs and generate monthly report if not. In order to save
information report of excel form can be gotten based space, in the process a safety announcement is not
on remote security assessment system of green generated, but to store the data required in a database
alliance, the excel file can be used as data exchange table. When information security administrators and
medium between the campus network security managers of subordinate units download the notice,
management service platform and remote security the system extracts the data from the database and
assessment. Because Excel files are from remote then generate notification file.
security assessment system, the format and content
of the document cannot meet the needs of users, so
this platform need special treatment for file format. 4 IMPLEMENTATION OF THE SYSTEM
Two types of bugs information files include two
work tables. The system bugs information file is The background of the system is developed by using
corresponding to the host profile and bugs JAVA programming language with good portability.
information work table; Web application bugs The hardware is Intel Core 3.2 GHZ CPU and 4GB
information file is corresponding to the site profile RAM; software isJDK1.8, Tomcat 8.0, and
and risk distribution table. In the process of Mysql5.6.The system has been developed and put
integration, the system would analyze the four work into use on the line.

51
5 CONCLUSION REFERENCES

The current campus network is booming, but there is [1] Qiongzhen, Huang. Survey and Analysis on University
no uniform standards and rules for the construction of Education Resource on Campus Network [J].China
university information. The application system is Educational Technology, 2010, (4):75 -80.
purchased and developed independently by the [2] Fu Xiaolong, Chen Huaichu, Wang Yingxue. Architecture
individual department. The department is also of Web Information Portal for Campus Network [J]. The
Chinese Journal of ICT In Education, 2002, (11):35-37.
responsible for most daily operation and maintenance
[3] Sanqiu, Zhang. Practice of Distance Education and
of the system. Due to the large number of campus Campus Network Construction in China [M]. Changchun:
network application systems and the scattered Yin Sheng Audio and Video Publishing House, 2003:10-15.
operation, universities cannot effectively manage [4] Yunwu, Wang. Research on the Construction of Digital
them. Due to the lack of unified management, coupled Campus in China [J].Modern Distance Education Research,
with security risk of Web system, the application 2011, (4):39-50.
system is frequently attacked. The campus network [5] Zuo Li. 2.0 Digital Campus [J].China Education Network,
security management platform can manage uniformly 2008, (4):8-9.
the record information and site of internal application [6] Gu Hongzhou, Jiang Chunran, Zhang Lingling.
system and help security managers find problems Investigation on the Construction of Network Teaching
before the attacker and timely repair, to provide an Platform at Home and Abroad [J].Guide of Sci-tech
important guarantee for the university personnel Magazine.
training and scientific innovation.

52

You might also like