Current location - Education and Training Encyclopedia - Education and training - Discussion on information security of e-government in construction industry?
Discussion on information security of e-government in construction industry?
With the wide application of the Internet, the problem of e-government information security is particularly prominent. It has become an urgent problem to analyze the threats faced by e-government system in construction industry, formulate feasible security defense strategies and ensure the security of information network. The network environment of government intranet, government extranet and public service network is established by TCP/IP protocol, which is based on openness and freedom, and lacks careful security design in protocol planning, service mode and network management, so the e-government information system itself has inherent security risks [1]. The security threats faced by e-government, including cyber hackers and crimes, the proliferation and spread of cyber viruses, information espionage and stealing secrets, attacks and sabotage by cyber terrorist organizations, illegal and illegal operations by insiders such as using pirated CDs, watching movies, listening to music and playing games, all these problems will lead to serious consequences such as network congestion, computer workstations not working, network switches not working, routers connected to the Internet being blocked, network systems being paralyzed, and information products being out of control.

As the final element of the system, data is the basis of information security, which is more important for e-government. Involving state secrets, departmental work secrets, internal sensitive information and public service information. Its main security risks are theft, tampering, forgery, denial and destruction. Openness of government affairs and network security itself are a pair of contradictions. "Openness of government affairs" requires smooth information network exchange, while "network security" requires strict control of information access rights, because various information exchanges may directly lead to network connectivity, and then lead to information security problems. At the same time, e-government systems are generally classified systems, and hackers are likely to infiltrate government departments for some purpose. It is easy to directly attack system vulnerabilities through links with poor network security protection, use vulnerabilities to steal classified information, or tamper with or pretend to be users, blocking normal network information services, and so on.

In addition, the operating system also has hacker attacks from the Internet; Regardless of the nature of the network, internal staff use office network terminals to connect to the Internet at will, and the irregular and persistent attacks of malicious viruses have formed the main hidden dangers of e-government security at present.

1 Analysis of e-government information security in construction industry

Construction mainly includes urban construction, village construction and engineering construction; Construction industry, real estate industry, municipal utilities and survey and design consulting industry. Construction administrative departments at all levels vigorously promote the requirements of rejuvenating the province through science and technology with information technology as the core. According to the Tenth Five-Year Development Plan of Construction Industry and the Tenth Five-Year Plan of Construction Industry Informatization put forward by the Ministry of Construction, we adhered to the development policy of construction industry informatization, which is "overall planning, resource sharing, application-oriented, market-oriented, safe and reliable, and pragmatic", actively set up a local area network, and basically realized the connection with the Internet. For example, 1996, the administrative department in charge of construction in Jiangsu Province has completed the construction task of exchanging 100M LAN and10M bandwidth information to the desktop. E-government information platforms such as Jiangsu Construction Information Network, Jiangsu Engineering Construction Network and Jiangsu Construction Network have been built successively, and the online application system for the qualification of construction enterprises in Jiangsu Province, the qualification management system of construction engineering supervision enterprises in Jiangsu Province and the construction project contracting management information system in Jiangsu Province have been developed. At the same time, according to the requirements of network information security and confidentiality, the Regulations on Computer Information Security and Confidentiality is formulated, which divides the network into two independent systems: the intranet and the extranet, in which the intranet runs the office automation (OA) system and the video-on-demand system. The confidential information of the confidential department is connected with the government intranet of the provincial party committee and government, and the physical isolation between the internal and external networks is strictly implemented to ensure the safe and reliable exchange of confidential information.

From the above analysis, we can see that the protection ability of network information security in the construction industry is still in the primary stage, and many application systems are in a low-level defense state. It's just that websites and email systems have been attacked or invaded by hackers for many times, or pages have been tampered with, or database data has been destroyed, or waves of virus attacks such as Nimda have caused damage to a large number of important data, and some business systems have been paralyzed. The network center sometimes shuts down the server for system recovery, antivirus and governance, which leads to the interruption of the website system service, causing great inconvenience and adverse effects to users. At present, the research on information network security in construction industry is still in the stage of plugging the security loopholes of existing information systems. The solution of these urgent problems depends entirely on the formulation of information security strategy and the construction of technical support system. At present, it is urgent to start with the overall planning of the information security system in the construction industry, and establish a complete set of network information security management system while establishing an all-round protection system. Only in this way can we ensure the healthy development of e-government in the construction industry and the safe storage and exchange of confidential information. There are four hidden dangers in network information security of construction industry:

(1) The database server and the Web server are on the same server. Once the website is attacked by hackers, the database as the core of e-government will be devastated.

(2) The whole LAN is in a subnet, and there is no division of network segments. Any computer in the LAN is infected with the virus sent by hackers, which will threaten all workstations in all LANs.

(3) Although the network center separates the internal LAN from the Internet connection security zone through the firewall, because the LAN Internet access and external connection share the same network channel, once the firewall is breached, the internal LAN and important resources lacking effective network security means will be exposed to hackers, and the consequences will be unimaginable.

(4) There is no network intrusion detection system between Internet and LAN. Misoperation, resource abuse and malicious behavior of users inside and outside the network cannot be effectively prevented and alarmed, and even if firewalls and antivirus software are installed, the fundamental problem cannot be solved. Only by installing network intrusion detection system and firewall can we stop and alarm the destruction of information network.

Therefore, in order to establish an efficient e-government system, construction administrative departments at all levels must first ensure the security of information networks. Without a secure network as a guarantee, it is impossible to establish an e-government information platform that can provide the public with "efficient, convenient and high-quality" services.

2 information security strategy in the construction of e-government

According to the policy of "adhering to active defense and comprehensive prevention" put forward by the national leading group, and drawing lessons from the experience of network information security management in Zhejiang and other brother provinces and cities, this paper puts forward that the network information security work of e-government in construction industry should follow the principle of "management first, strategic linkage, layer-by-layer defense and three-dimensional protection".

(1) Management is the principle. "Three-point technology and seven-point management" plays an important role in the security construction of e-government. The network provides various convenient applications to help people improve their work efficiency. At the same time, due to many management reasons, the information network is unsafe and unstable. Especially in the process of e-government, the problem of network security is prominent, because government workers are very alert to information network security.

Not high, resulting in low operating efficiency, waste of investment and serious leakage.

(2) The principle of strategic linkage. The strategic connection between management and technical solutions is the best way. First of all, it is necessary to coordinate the safety management strategies of all departments under an overall safety and management policy, so that the system can ensure its safety and operational efficiency to the maximum extent. Secondly, at the product and technology level, one technology can be linked with another technology, learn from each other's strong points, realize real organic combination, and realize comprehensive protection and management.

(3) The principle of layer-by-layer fortification. Safety management should consider multi-level issues, including management level and technical level. The management level involves two aspects: management strategy and management method. First, formulate a strategy that meets the actual needs and implement it in an efficient and economical way. Second, when hackers destroy or invade a system, they use various methods, including eavesdropping, IP masquerading, using network protocols and application vulnerabilities. These places need to be well protected, and one kind of security means and technology can't achieve all protection, so they need comprehensive planning and layer-by-layer fortification.

(4) Three-dimensional protection principle. When planning and implementing the network security and management system, we need to design it from a global and long-term perspective. In order to make this network security and management system conform to the current development trend of security and management, and solve the possible security and management problems at present and in the future, it is necessary to make this system a multi-dimensional and extensible system at the beginning of network security and management system design to meet the current needs and future development. Secondly, it is necessary to divide the system and decide which ones are urgently needed and need to be implemented immediately; Long-term considerations need to be implemented step by step and in a planned way.

3 construction industry e-government information security technical support system

The security goal of e-government is: to protect the value of government information resources from infringement, to ensure that the owners of information assets face the minimum risk, to obtain the maximum security benefits, and to make the information infrastructure, information application services and information content of e-government have the ability to resist the above threats of confidentiality, integrity, authenticity, availability and controllability [3]. In view of the information security of e-government is facing high-tech confrontation, involving laws, regulations, standards, technology, products and services, infrastructure and many other fields [4]. Combined with the structural characteristics of e-government network construction in the current construction industry, this paper puts forward the following e-government network security technical guarantee system.

3. 1 Physical layer security solution

From the physical environment, there are environmental accidents such as earthquake, flood, fire, lightning strike, power failure, human error or mistake, electromagnetic interference, line interception and so on. All pose a threat to the security of information systems. Ensuring the physical security of all kinds of equipment in computer information system is the premise of ensuring the security of the whole network system. The security design of physical layer should be considered from three aspects: environmental security, equipment security and line security. The measures taken include: computer room shielding, power grounding, wiring concealment, data transmission encryption and data safe storage. In addition, according to the relevant documents of the Central Security Committee, whenever a computer has the application requirements of both the internal network and the external network, it is necessary to adopt the network security isolation technology and install the isolation card on the computer terminal, so as to fundamentally realize the physical isolation between the internal network and the external network and prevent confidential information from leaking through the external network.

For more information about project/service/procurement bidding, and to improve the winning rate, please click on the bottom of official website Customer Service for free consultation:/#/? source=bdzd