[1]刘鹏. 会计电算化系统信息安全集成解决方案[J].计算机技术与发展,2017,27(08):135-138.
 LIU Peng. Integrated Solutions on Information Security for Accounting Computerization System[J].,2017,27(08):135-138.
点击复制

 会计电算化系统信息安全集成解决方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年08期
页码:
135-138
栏目:
安全与防范
出版日期:
2017-08-10

文章信息/Info

Title:
 Integrated Solutions on Information Security for Accounting Computerization System
文章编号:
1673-629X(2017)08-0135-04
作者:
 刘鹏
 渤海大学 管理学院
Author(s):
 LIU Peng
 accounting computerizationsystem; information security;integrated solutions;identity authentication;data encryption Trojan monitoring
关键词:
 会计电算化系统信息安全解决方案身份认证数据加密木马监测
分类号:
TP309
文献标志码:
A
摘要:
 网络的开放性和共享性特征导致会计电算化系统存在着巨大的网络信息安全风险.结合会计电算化系统的特性,提出了数据信息安全集成解决方案,以方便会计电算化软件系统开发并同时保证企业财务会计信息安全.该方案运用网络安全技术和方法,基于USBKey的身份认证流程,通过客户端与服务器的信息交换实现了双重认证,基于字段级加密方式,给出了加密/解密流程以及AES高级加密标准算法和基于行为特征分析的木马监测模型及其阈值判别算法.实验结果表明,通过身份认证,阻止了非法用户进入系统;通过数据加密,解决了网络传输和存储过程中的泄密;通过木马监测,事先预防可能发生的盗取账号密码和数据.该方案可作为软件开发的依据和参考,有助于提高会计电算化系统的安全性并降低系统软件的开发成本.
Abstract:
 The openness and sharing of the network lead to the huge network information security risk in the accounting computerization system.Combined with the characteristics of the accounting computerized system,the data information security integration solutions are presented,which is convenient for the system development of the accounting computerization software and ensures the security of the enterprise financial accounting information.It adopts network security technology and methods based on the USBKey identity authentication process,through the information exchange between the client and server for implementation of dual authentication.Based on the field level encryption mode,the encryption/decryption processes,AES advanced encryption standard algorithms,Trojan monitoring models and behavior characteristics analysis and threshold discriminant algorithms are proposed.The experimental results show that adopting identity authentication strategies prevents illegal users from entering the system and adopting data encryption strategies solves the leak in the process of network transmission and storage;adopting Trojan monitoring strategies makes prior preventions for stealing account passwords and data.Therefore the proposed scheme can act as the basis and reference for software development,which is helpful for improvement of the security of the accounting computerized system and reduction of the development cost of system software.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(08):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(08):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(08):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(08):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(08):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(08):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(08):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(08):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(08):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(08):47.

更新日期/Last Update: 2017-09-21