登陆注册
8931100000039

第39章 附录:非现场经济实践案例(3)

When designing a security project and methods of identity distinction,the following aspects should be taken into consideration:

1.security of the macro environment where the entire Digital Library usage takes place,so that it can be free of malicious attacks;

2.guard against malicious downloading or improper usage;

3.A system to distinguish the identities of multilevel users;

4.the after the event trace ability of each incident and conservation of evidence;

5.the decentralization system of the application and calculability of the application's value.

Within the information economy,applications and their security plans track of evolution often reflects information economy's track of advancement in that country or industry,and is also a symbol of the degree of information economy's maturity in that country or industry.

Application demands and means of realization are closely related,that is to say,the realization of demands needs realizable technological means as its support,and so the Digital Library application's integral security plan is built upon the foundation of technological advancement.

2.Integral Solutions to Basic Security Issues of Off-site Activities

2.1 Integral Security Measures of the Digital Library Application

Application terminals within off-site economical activities are changing bit by bit to mobile terminals.Therefore,when designing the application scheme,we must take into consideration the integrity of the terminal,the channel and the platform.

We must start from terminals,the foundation support of and window to off-site information economy,and research into and reflect upon applications,terminals,and the Internet as a whole.

A simple frame diagram can be used to illustrate the solution to the integral security environment of the Digital Library,one type of the off-site information economy activities:

What we need to clarify here is:

A.The Digital Library’s data bank and the Digital Library application's service system are two mutually independent but closely related platforms;

B.Setting and verifying status level needs to be completed on two synchronized platforms,in order to prevent key players excess reliance;

C.It's necessary to forward-lead environmental security,separate the public network from the private network,and enable professional vendors(such as China Telecom,China Mobile)to be in charge of the private network of shielding the private network with strong firewall settings.

D.This frame diagram represents assumed safety meas ures under the premise that the application's richness and accessibility is guaranteed.It mainly uses two ideas,identity distinction and private network from terminal to internet connection,to achieve secure shielding,and synchronized physical and software methods to effectively shield the private network from the public network.

2.2 Environmental Security Measures of the Digital Library Application

Not long ago,the government promulgated People's Republic of China Decree of State Council,People's Republic of China Central Military Commission No.579 Order,and announced People's Republic of China Regulations on Radio Control,which will be executed starting November 1st,2010.According to this administrative regulation,the government can implement radio control when necessary.

Because of modern information economy’s trend of development,the national economy is relying more and more on radio technology,which is to say with abnormal economic infiltration(such as the Super-Internet-Bank increasing off-site trading),in a certain time interval,governmental radio regulation will increasingly affect citizens life and economic activities,and could even affect citizens daily life and their overall economic situation on a large scale and in all dimensions.For example,during the 7/5 Xinjiang Riot of 2009,the government and relevant parties temporarily shut down the local internet,there by basically paralyzing developing off-site office work and off-site trading within that region.

Under specific conditions,such governmental acts of regulation are unavoidable.The key point of the situation is defining the limits of such temporary regulations,of which there are geological limits,and also network-suitable groups and network usage limits.Under situations when network-suitable groups and network usage cannot be distinguished from one another or the network system cannot be separated technologically,and the government needs to make a decision to regulate,relevant parties can only completely shut down or otherwise regulate all radio establishments.

Therefore,in today's rapidly developing age of information economy,we definitely have the need to separate the network into a specific network for suitable groups and a network for general usage.

This is not only a demand of application security under a particular system,but is also a demand by this particular system in order to achieve continual,stabilized operation within the entire operating environment.

同类推荐
  • 现代促销理论与实务

    现代促销理论与实务

    促销是企业向消费者或用户传递产品或服务信息的一系列说服活动。本书对促销组合的四个方面进行了综合阐述。包括总论、人员推销篇、广告篇、公共关系篇、销售促进篇五部分共十八章内容。
  • 疯狂的温州商人

    疯狂的温州商人

    本书主要从温州人“疯狂”的天性入手,分别在其创业、头脑、炒作、冒险、抱团、财技、营销、抓钱、攻伐、资本、速度、人脉这十二个环节上,对温州人的“疯狂”做派进行了深入的剖析。其中不仅包含了对温州人经商技巧和经商智慧的总结,而且针对每一环节的特点,还加入了真实、生动的温商的成功案例,以对其所代表的方法特征加以运用和证明。
  • 微观社会主义经济研究

    微观社会主义经济研究

    《微观社会主义经济研究》一书,是作者不断思考中对于人类社会发展以及自然规律的发现和总结,是一把试图解开人类生存、生活、发展中所遇到的种种问题的钥匙。是为了使人类全面认识、充分利用资源,尽量减少灾源,甚至消灭灾源,使人类有一个良好的生存、生活环境而写的经济学著作。
  • 商人活用孙子兵法

    商人活用孙子兵法

    本书将古代智慧与现代商业经营紧密结合,以全新的解读方式,通过精辟的活用解析与经典的经营案例,多层次、多角度阐述了现代商战的策略与技巧,堪称商界有识之士赢得商战竞争的智慧之源。
  • 直接补贴政策有哪些

    直接补贴政策有哪些

    本书汇集各地强农惠农直接补贴政策,对生产性补贴(如粮食直补、良种补贴、农机具购置补贴、化肥等农资综合补贴)和生活性补贴(如合作医疗补贴、义务教育补贴、劳动力转移培训补贴、家电下乡补贴)等政策进行阐释,并就一些常见的问题以问答的形式给出相应的解答,力争让政策落到实处,让农民朋友及时了解其应该享受的优惠,尽快富起来。
热门推荐
  • 夜色断肠

    夜色断肠

    既是游戏,更是人生.一个身份背景复杂尴尬的盗贼托庇于与他同样尴尬复杂的希尔瓦娜斯女王的法力重生,回到了艾泽拉斯大陆.可立场却因为这次重生全盘改变,他靠着巧合的机缘和机敏的才华,在艾泽拉斯大陆不断战斗,是为了仇恨,为了生存还是为了梦想和即将出现的爱情?谨以本文阔别付出4年心血的魔兽世界游戏,并用它来标志我的AFK.希望大家能在其中读到就算不够凄美但是绝对有味道的爱情.
  • 恋上校长的女儿

    恋上校长的女儿

    我武子健,今年18岁和我爱着的安雅同在一所学院,都住在在帝都市,可是她的父亲是校长不让我们俩不正常的来往,安雅也因为此事和她父亲吵过很多次架,也引发了许许多多的事情,还让我们一同在小说里来发掘,小说中也有一些讨男孩子对你有好感的攻略。求收藏!作者还望各位读者收藏一下!
  • 岁月不及时光长

    岁月不及时光长

    她,容颜如花,一身的清秀,溢出浅浅的笑颜。柔弱的内心,蕴藏着一缕情愁和多份倔强,眼角处淡淡的忧伤,如秋雨般落寞的模样。他,高傲的像颗看不到路的树,只因她的一回眸,爱恨情仇颠覆一辈子。
  • 灰剑神王

    灰剑神王

    鬼、妖、仙、龙、狼人、精灵、娜迦、巨人、吸血鬼……一直都存在着只是大多数人所不知道而已。魔法、仙术、巫术、圣力、佛法甚至是妖术都可以被人类习的,只是大多数人无法学习。天堂、地狱、天界、仙界、冥界、极乐世界……这是世界一直都存在只是很少有人真正的去过,更少有人回来过。他曾经的教皇,发动了历史上最大的圣战。但壮志未酬便因伤而“死”。之后却从冥界归来。他又将如何一步一步成为至高无上的神王。《灰剑神王》第一卷重返冥界第二卷紫月大陆第三卷入侵地狱终卷天堂决战
  • 东阳武圣

    东阳武圣

    穿越屌丝河东阳,偶得紫石,看他如何掀翻武道大陆,看他如何纵横长空,力压万万天骄,屹立于武道之巅,风云涌起掌相恨,万宗林立千百更。万阳齐开魂不灭,只为一念道无言。
  • 冥祭者

    冥祭者

    生与死的徘徊,善与恶的较量。你的命运掌握在死神的手中,同时你也可以杀死死神,成为凌驾于死神的存在。每个世界,每个地方,恐惧的力量无处不再,杀戮的血腥也每天在上演。你无法选择逃避,因为,你的生活早已经变成了恶魔的人间屠宰场。这是一部发掘人性最美好的小说,同时也是一部发掘人性最丑陋的小说。一夜成佛,一夜成魔。这一切取决于你。因为,你就是这部书的主角。而故事看似虚构,其实是写着最最真实的你自己。
  • 红漓守护之漫漫长路

    红漓守护之漫漫长路

    如果可以重来,有些事是不是就能避开?虽然不知道自己为什么会回到小时候,就算这是上天给自己的恩赐吧!苏冉一直没什么大的理想,家庭和睦,父母健康,当个米虫,可那个男人是谁?男子勾起最近邪魅的笑着:“苏冉你是我的命中注定!”
  • 相遇

    相遇

    里面有些元素和终极一班类似,但是剧情绝对不相同。希望读者不要追究。
  • 不打不骂巧教妙养

    不打不骂巧教妙养

    《不打不骂巧教妙养:培养最棒孩子的36种方法》提倡的教育理念是不打不骂,诚然在实际的家庭教育中,父母不会每天都有好心情,每天都会有耐心解答孩子的问题。当心情不好的时候。家长应该怎样调节,在《不打不骂巧教妙养:培养最棒孩子的36种方法》中也提供了一些方法。
  • 三府三界

    三府三界

    三界的尸骨掉在三府,就像恶鬼得到美食。三府的珍宝扔到三界,就像富翁望见乞丐。这是为什么?!混乱的三府矛盾,难解的三界纠葛,等级严密的六层世界。生灵亡灵带着恐怖戾气血腥,猎灵锻造开启各自神通,离奇的背弓者与大罗师,是什么让他们存于世上?生灵操控的灵徒,亡灵驾驭的魂奴,他们缘何甘于行尸走肉?这个混乱的世界,只有星术师的魂河可以呈现出来。煅燃拜访了一个星术师,带着他的鉴定走出了星河,纸张之上写道:“汝之笔力若道出此种乾坤,化成尔等人类之文,汝之十指,恐写断之!”新书求收藏。