Be versed in the design problem that controls software security is discussed

  • Time:
  • Click:78
  • source:JANEZH CNC Machining
Network technology and information revolution also brought labour to control the technical revolution of course of study, and labour controls software is the software part that is versed in in controlling a system, be used at controlling industry to produce, the demand of its security and dependability is very high. Because it matters to the safety of the safety of industrial production and people life property. Labour dominates the end that the security of software asks, it is to make sure systematic usability, integrality is mixed secret quality. Usability should make sure systematic function can be used at any time namely. The data that integrality should assure to the system is operated namely is correct, complete. Secret the confidential sex that the gender is systematic information. Be versed in the security that controls software and dependability are having close relationship, dependability is the magnanimity of consistence of a kind of software, and a subclass that security is dependability. One, the technology that labour accuses software security to involve the safety to assure a system, be about to adopt systematic safety strategy. What can use following a few safe technologies to ensure labour controls software system is safe: Attestation technology, visit control technology) , audit technology, safe infrastructure, inbreak detect technology) , firewall technology, backup and restore a technology. The graph is simple and safe systematic frame sketch map 1, labour accuses software to should labour of identity attestation function accuses software to should have identity attestation function, it is the identity that the user must confirm him to client end. Client end needs to or many servers perhaps serve the identity that confirms his. Identity attestation has 3 kinds of basic kind: A certain confidential information that ① user knows, be like oneself countersign; ② user holds some a certain confidential information, the user personification parameter of the memory in getting stuck like intelligence; ③ user place has some certain biology features, wait like design of dactylogram, sound, DNA. 2, labour accuses software to should the visit controls a function to visit control is to who solve (main body) to a certain specific target (object) the technology of security of a system that has He Chongquan to be restricted. It incorporates the crucial technology of two respects, it is safety makes a technology politicly on one hand, how to convey main body to have to object namely why to plant attributive, it is the implementation technology of safe strategy on the other hand, the strategy that how will formulate namely is carried out effectively. 3, the data that the audit function that labour controls software to should particular audit function industry controls software passes the audit such as the log namely, will examine all sorts of incident. Among them log should note the following problem: Capacity control problem, avoid to delete problem, inquiry rate issue illegally. 4, labour accuses software and defend virus technology compatible industry controls software should with defend virus technology compatible, be united in wedlock cheek by jowl with technology of control of technology of virus firewall software, visit, ensure the system is safe. 5, labour controls software as should compatible as other and safe technology industry controls software as should compatible as safe infrastructure, and with inbreak detect technology, firewall technology, backup and restore a technology to be united in wedlock cheek by jowl, ensure the system is safe. 2, the issue that compose proposes safe work to accuse software to should consider 1, a when choose language compose to build safe work to accuse software to should consider the most important technology option is to use which kind of programming language to come true. The element that wants a consideration is very much. For example, efficiency. 2, choose distributed object platform distributed object has a lot of, be like CORBA, DCOM, RMI and EJB. To security, every kinds of technology has different feature, want to consider these features when selecting recipient. The security that should consider place of every kinds of technology to offer serves. 3, it is OK that modern operating system is in selection operating system to go up logically cent is systematic kernel and user space. The program moves in user space, but when should needing special service, can call a kernel now and then. A lot of crucial services move in kernel space. The safe pattern that the kernel has some kind of kind normally will manage the visit of pair of equipment, file, process and object. What this one basic mechanism and its interface can follow an operating system is different and show apparent difference. 3, conclusion labour accuses software to having long history, but because inchoate control system is,close, all security problem is not very outstanding. Such before security demand considers rarely when labour accuses software to design, as the development of the network, it is more and more important that labour accuses software security, make a task that must consider and takes seriously. When the design that undertakes is versed in controlling software, must come to security design do as a main job. Use proper safe technology, ensure industry controls systematic safety. CNC Milling CNC Machining