登陆注册
14855800000039

第39章 附录:非现场经济实践案例(3)

When designing a security project and methods of identity distinction,the following aspects should be taken into consideration:

1.security of the macro environment where the entire Digital Library usage takes place,so that it can be free of malicious attacks;

2.guard against malicious downloading or improper usage;

3.A system to distinguish the identities of multilevel users;

4.the after the event trace ability of each incident and conservation of evidence;

5.the decentralization system of the application and calculability of the application's value.

Within the information economy,applications and their security plans track of evolution often reflects information economy's track of advancement in that country or industry,and is also a symbol of the degree of information economy's maturity in that country or industry.

Application demands and means of realization are closely related,that is to say,the realization of demands needs realizable technological means as its support,and so the Digital Library application's integral security plan is built upon the foundation of technological advancement.

2.Integral Solutions to Basic Security Issues of Off-site Activities

2.1 Integral Security Measures of the Digital Library Application

Application terminals within off-site economical activities are changing bit by bit to mobile terminals.Therefore,when designing the application scheme,we must take into consideration the integrity of the terminal,the channel and the platform.

We must start from terminals,the foundation support of and window to off-site information economy,and research into and reflect upon applications,terminals,and the Internet as a whole.

A ****** frame diagram can be used to illustrate the solution to the integral security environment of the Digital Library,one type of the off-site information economy activities:

What we need to clarify here is:

A.The Digital Library’s data bank and the Digital Library application's service system are two mutually independent but closely related platforms;

B.Setting and verifying status level needs to be completed on two synchronized platforms,in order to prevent key players excess reliance;

C.It's necessary to forward-lead environmental security,separate the public network from the private network,and enable professional vendors(such as China Telecom,China Mobile)to be in charge of the private network of shielding the private network with strong firewall settings.

D.This frame diagram represents assumed safety meas ures under the premise that the application's richness and accessibility is guaranteed.It mainly uses two ideas,identity distinction and private network from terminal to internet connection,to achieve secure shielding,and synchronized physical and software methods to effectively shield the private network from the public network.

2.2 Environmental Security Measures of the Digital Library Application

Not long ago,the government promulgated People's Republic of China Decree of State Council,People's Republic of China Central Military Commission No.579 Order,and announced People's Republic of China Regulations on Radio Control,which will be executed starting November 1st,2010.According to this administrative regulation,the government can implement radio control when necessary.

Because of modern information economy’s trend of development,the national economy is relying more and more on radio technology,which is to say with abnormal economic infiltration(such as the Super-Internet-Bank increasing off-site trading),in a certain time interval,governmental radio regulation will increasingly affect citizens life and economic activities,and could even affect citizens daily life and their overall economic situation on a large scale and in all dimensions.For example,during the 7/5 Xinjiang Riot of 2009,the government and relevant parties temporarily shut down the local internet,there by basically paralyzing developing off-site office work and off-site trading within that region.

Under specific conditions,such governmental acts of regulation are unavoidable.The key point of the situation is defining the limits of such temporary regulations,of which there are geological limits,and also network-suitable groups and network usage limits.Under situations when network-suitable groups and network usage cannot be distinguished from one another or the network system cannot be separated technologically,and the government needs to make a decision to regulate,relevant parties can only completely shut down or otherwise regulate all radio establishments.

Therefore,in today's rapidly developing age of information economy,we definitely have the need to separate the network into a specific network for suitable groups and a network for general usage.

This is not only a demand of application security under a particular system,but is also a demand by this particular system in order to achieve continual,stabilized operation within the entire operating environment.

同类推荐
  • 货币

    货币

    俗话说:有钱能使鬼推磨。没有钱是万万不行的。但是对于与每个人生活息息相关的货币,我们究竟真正知道些什么?翻开钱包,为什么卡越来越多,而钱越来越少?本想在股市里大赚一把,岂料开着“宝马”进去,却骑着“毛驴”出来?在贫富差距越来越大的当下,为什么穷人忙存钱,而富人忙贷款?有了钱,我们真的就会幸福吗?马骁、李秀婷、陈文魁编著的《货币》将用金融学知识为您讲述货币的“细节”和“道理”,解答您日常生活中热切关注或非常困扰的关于“货币”的疑惑。
  • 中国经济随笔

    中国经济随笔

    自2008年爆发全球经济危机以来,中国的经济增长与和平崛起日益为世人瞩目。作为著名的中国经济问题专家,作者曾参与中国经济改革进程,对中国经济问题有独到的见解。《中国经济随笔》就是作者在2008年和2009年关于中国经济问题的一些思考,多涉及当前中国经济的热点话题,也介绍了作者本人如何运用经济学理论和方法研究经济问题、提供政策建议,既具理论价值,更具实用价值。作者对中国诸多经济问题的评判既不是随兴而发的议论,也不是学究式的套套逻辑,而是以学理为依据的客观评判,他对经济学理论如何应用于社会变革的诸多……
  • 成功文库-青少年必知的30个

    成功文库-青少年必知的30个

    本书系统介绍了会计基础知识,会计做账技术培训,会计查账技术培训,会计核算技术培训,会计用账、报账、调账技术培训,会计文案写作技术培训,财务管理的目标、原则及环境等内容。
  • 俄罗斯企业制度变迁

    俄罗斯企业制度变迁

    本书运用现代企业理论,通过分析前苏联时期企业制度的内容、特点和问题,揭示了俄罗斯制度变迁的根本原因;在此基础上重点研究了俄罗斯股份公司的治理结构,对俄罗斯公司的内部治理、外部治理和重组做了深入考察,并以发达市场经济国家的公司治理为参照系,对俄罗斯公司的制度安排作了对比研究,得出“俄罗斯的公司治理结构是一种转轨国家特有的、尚未成熟的兼具英美模式和德日式特征的综合性治理结构”的结论;同时,该书还从俄罗斯的宏观环境、政治法律制度和意识形态等方面,对俄罗斯早期企业制度的低效率做了多角度的解释,得出了自己的结论。
  • 梁启超的经济面向

    梁启超的经济面向

    梁启超的著述非常多,所涵盖的题材相当宽广,但有一个面向是至今尚未被充分探索的,那就是他的经济论述。在梁启超的全集里,经济论述所占的比例不高,只是作为他议论众多时事的一环;但他对某些经济问题曾下功夫深入研究过,尤其关注币制改革和财政制度。梁启超的文笔犀利活泼,老少咸宜;他所论述的主题,大都具有时事性与政策建议的意涵,很能引起当时读者的关注。但从另一个角度来看,这项特性也是负面的:环境一变、时间一过,这些问题的意义就随风而逝(“能动人”但“不能留人”)。一个世纪之后,本书作者重读梁启超的经济论著,得到三个观感:文笔方面情绪高张,内容方面动人听闻,手法方面自我矛盾。
热门推荐
  • 血玉镯

    血玉镯

    机缘巧合之下,她得到神秘人赠予的锦盒。盒内竟是一块血玉制成的镯子和写着“无悔”二字的字条。在血玉的牵引下,她来到千年之前的大祁王朝。他是英俊潇洒、忧国忧民的太子。他是仪表堂堂、学富五车的才子。他是狠毒残忍、阴险狡诈的鬼王。他是刚直正义、武功强绝的侠士。而她,从相府丫鬟到大祁千岁。过五关斩六将,出奇谋破奇案,闯过重重磨难。最终她又会何去何从?
  • 泡尽女文豪

    泡尽女文豪

    赵昀得意的笑:哥的目标就是泡尽女文豪,哈哈哈哈。
  • 阴阳鬼途

    阴阳鬼途

    色字头上一把刀,男人要把持住下半身,当欲望掌控了身体就容易做些错事,因为和几个诡异女人的露水情缘,三魂七魄丢失的干干净净,各种无法想象的灵异事件出现在我的身边,一开始还只是恐惧,到最后已经变成了绝望。然而最令人绝望的是,我并没有死,仍然能够活着,像个行尸走肉一般踏上寻找魂魄的道路,惊悚的定西老坟,诡异的无人村庄,步步杀机的新疆沙海……这并不是一个简单的故事,也许有一天当你透过猫眼看向外边的时候,却只能看到一只遍布血丝的眼球,并且有个身边在耳边响起,天黑了,一起来玩吧!
  • 美漫布武

    美漫布武

    出征仪式上高文意气风发,睥睨天下道:“灭霸,燃烧军团,我高文来了!”他的身后,众英雄一齐欢呼呐喊起来。美队高举盾牌:“为了联盟!”绿巨人大吼道:“为了部落!”这是一个猥琐的狗策划,带着一众美漫英雄,不断在两个世界来回搞事的故事。
  • 自然辩证法新编

    自然辩证法新编

    本书在内容结构上,采取从观念、理论、方法到实践的逻辑,分为自然观、科学观、技术观、科学方法、技术创新方法及科学技术与社会的相互作用6个层面。在具体写法上又将知识分层结构原理和方法贯彻始终,不仅使读者能够理解理论本身,还能够知晓理论形成的条件和根据,以及如何应用具体原理分析和认识科学、技术、经济及社会现实问题。另外,注重案例分析和关系分析也是本书的特点。关系分析有利于培养学生分析问题的能力,而案例分析更是培养学生解决问题能力的好方法。
  • 斗罗大陆之奇幻武魂

    斗罗大陆之奇幻武魂

    这是一个你喜欢的故事,这是一个有心的人物。
  • 天行

    天行

    号称“北辰骑神”的天才玩家以自创的“牧马冲锋流”战术击败了国服第一弓手北冥雪,被誉为天纵战榜第一骑士的他,却受到小人排挤,最终离开了效力已久的银狐俱乐部。是沉沦,还是再次崛起?恰逢其时,月恒集团第四款游戏“天行”正式上线,虚拟世界再起风云!
  • 以妻之名

    以妻之名

    一个被丈母娘算计,被丈人嫌弃,被老婆无视的赘婿,走投无路之时,从老家墙壁里撞开了一张瑞士银行黑卡,从此走上逆袭之路……
  • 天启时代宿命

    天启时代宿命

    上青冥,入幽冥。事事错,物物诡。自从祸乱开始,暗黑时代的开始,由惑到霍,再到祸,本因霍止祸终而结束。却在末法时代发生更大的灾祸,成了苍生的末日。是为了追求那诸神黄昏的真相,还为了万法黎明的力量,或只是为了更好的活下去。他孤身一人来到这漩涡的中心应劫。宿命开始于此。
  • 我的传奇人生

    我的传奇人生

    山村里的平凡少年赵易得在山里挖草药的时候被不知名的虫子咬了一口,当时满不在乎的他,却想不到他的人生从此不再平凡,虫子让他在不知道的情况下变的聪明,记忆力强悍,身体强壮,力大无穷,反应敏捷。当一个超级小强从山里走出来,走进这花花世界,走进这到处都是钢筋水泥的建筑,到处都是红男绿女,到处都充满繁华的都市,他又将怎样遨游在这个他认为平凡的人生之中。敌人有、热血冲动会有、柔情似水也会有、悲伤会有但不会持续太长,毕竟是传奇一生。