Risk Analysis of E-government Information Security

I wonder if the following can help:

Security Solution of Mobile E-government

Scheme description?

The network security of e-government system is very important, even the private network needs to consider data security. Moreover, many systems combine Internet applications, which makes the problem of security requirements more prominent. Mobile information office has become a development trend. At present, the first step of e-government construction in China is office automation, and the future development direction is mobile office. ?

This scheme mainly solves how to use smart phones, laptops and other mobile terminal devices to access the e-government information system safely and at any time. ?

By constructing IBC center, IBCkey and RF-SIM card, the security level of corresponding applications can be enhanced. The specific description is as follows:

Deploy the IBC key management platform: the platform is securely connected with the IBC key platform to manage the generation, activation, deactivation and cancellation of control keys; ?

Deploying password front-end machine: connected with short message gateway, responsible for encrypting short messages and issuing security keys, and at the same time issuing OTA instructions to control key attributes; ?

Deploy a unified authentication access platform: the platform is responsible for authentication access of mobile government system terminals and encryption of data transmission; ?

Deploy security middleware for user terminals: install security client on every mobile phone terminal, PC or notebook that uses e-government, and be responsible for secure login and data transmission encryption; ?

Summary of characteristics?

Comply with the specifications of the National Cryptography Administration:? Adopt equipment approved by the State Secret Service to provide comprehensive security level protection from data transmission, telecommuting and identity authentication; ?

Suitable for internal private networks and the Internet: it can adapt to both private networks, the Internet and mixed complex networks. ?

Support various 3G applications: Solve the security problems of mobile office and support various 3G standards;

Based on this method, rich extended applications can be easily expanded, such as encrypted e-mail, safe storage of files, encrypted U disk and so on.