Computer and Systems Engineering | Article | Published 2023
Intrusion and data management detection systems, firewalls and other security devices ensure the secure operation of the network. In a computer system but with the widespread use of the network, viruses, hackers and other security incidents are increasing, which are security devices sends out tens of thousands of alerts in a very short period of time, network management staff are hard to find useful this is based on data from big signals. In addition, the ever-expanding network, mobile network, data management, Information related to SMS, MMS messaging service system, unified security device cannot detect all attacks, so we need to think about how and we need to create a secure system for these devices to work together. In this article, based on the above issues, mobile data network security the integrated management system is studied and the research and implementation of the security incident management mechanism was discussed in detail. The event management proposed in this article can be considered as an extension of the network concept and management, which enriches the content of the five functions of network management. In addition, the traditional network management and system management are two independent concepts. Two control systems can be combined together and in the system network security can be further improved through incident management. The purpose of the security event modeling is understood as the process of formatting events from various event sources to facilitate further processing. This article is object oriented the modeling method is adopted, it is scalable and at the same time, the difference of all types of phenomena is fully taken into account. For the system description of the model, this article uses the XML,HTML language, which is universal. Network damage of a computer virus security management is getting bigger and bigger, features and typical symptoms of computer virus and its harmfulness is analyzed and the security of the mobile communication network is analyzed. A recommended system modification is installed in the process control system to prevent the virus. The implementation of a common security management system in the mobile data network is the focus of this paper, mainly three aspects of mobile data network audit log management, security event monitor and account password management involves the involvement of several business systems in the implementation of an integrated security management system. In this article we will take computer systems rule-based hierarchical system architecture, the degree of connection of each module is relatively loose, and it is a system with great flexibility will consist of placement.