HOME JOURNALS CONTACT

Information Technology Journal

Year: 2013 | Volume: 12 | Issue: 24 | Page No.: 7930-7937
DOI: 10.3923/itj.2013.7930.7937
Research on Classified Protection-based Security Construction for University Information Systems
Chunling Wu, Hehua Li and Wei Wei

Abstract: Information security classified protection is a basic system of China’s information security protection. Conducting information security classified protection in colleges and universities is not only a key content in strengthening national information security work, but also an effective measure to improve the information security level of university networks. The paper first summarizes common information subsystems in China’s universities and colleges, describes the functions of these subsystems and offers the recommended classified protection levels for these subsystems. Then, this paper divides an university information system into various modules based on security domain according to the security strategy of “all Grade II systems forming one security domain and each Grade III forming one security domain” and gives the access control methods for security domain boundaries. Finally, according to the requirements on Grade II systems by China’s national standards concerning classified protection, this paper analyzes the contents and objectives of security construction for Grade II security domains from five aspects, thus offering a reference for universities to conduct classified protection based information security construction.

Fulltext PDF

How to cite this article
Chunling Wu, Hehua Li and Wei Wei, 2013. Research on Classified Protection-based Security Construction for University Information Systems. Information Technology Journal, 12: 7930-7937.

Keywords: Classified protection, security domain, information security and information System

REFERENCES

  • Anonymous, 2013. Classified protection of classified information systems. Baidu, June 5, 2013.


  • BMB 17-2006, 2006. Technology requirements on graded protection of information systems involving state secrets. British Medical Bulletin, UK.


  • BMB 20-2007, 2007. Management specification on graded protection of information systems involving state secrets. British Medical Bulletin, UK.


  • Education Management Information Center under the Ministry of Education of China, 2013. Thematic work on the classified protection of educational information security. China, May 10, 2013.


  • GB/T 22240-2008, 2008. Information security technology-classification guide for classified protection of information system. http://www.codeofchina.com/gb/it/18935.html.


  • GB/T 22239-2008, 2008. Information security technology-baseline for classified protection of information system. http://www.cn-standard.net/ebzdetail/742/EB223605.shtml.


  • GB/T 25070-2010, 2010. Information security technology-technical requirements of security design for information system classified protection. http://www.cn-standard.net/ebzdetail/501/597841D0.shtml.


  • Hong, X., A. Peng and J.W. Liu, 2008. Partition and hierarchical protection of E2 government system. J. Chongqing Institute Technol., 22: 99-103.


  • Sang, S.Y., G.A. Xu and M. Zhang, 2010. Design and implemention of security level conformance verification platform for information systems. University of Beijing, China.


  • Hu, Z.R. and H. Fan, 2010. Design implementation and application of technical plans for classified protection-based security construction of information systems. Publishing House of Electronics Industry, China

  • © Science Alert. All Rights Reserved