Welcome to Francis Academic Press

Academic Journal of Business & Management, 2023, 5(13); doi: 10.25236/AJBM.2023.051318.

A Study of the Security Management System for University Privileged Accounts Linked with Fortification Machines: Practical Research

Author(s)

Yunjie Li, Dan Zhang, Xianjun Meng, Yanbo Chen

Corresponding Author:
Dan Zhang
Affiliation(s)

Educational Technology and Information Center, Shenzhen Polytechnic, Shenzhen, 518055, China

Abstract

In practice, the management mode and methods of privileged account in information systems often have significant security risks. This paper studies and elaborates on the security management system of privileged accounts and the technical characteristics and advantages of bastion host. Through the seamless linkage of the two, an efficient, long-term, and secure privileged account security management system is proposed, which can achieve full coverage and lifecycle management of different types of privileged accounts, timely identify account risks and dispose of them, and meet industry regulatory requirements. The system satisfies the requirements of industry regulations and laws.

Keywords

Privileged account management, Bastion host, Information security, Operation and maintenance management

Cite This Paper

Yunjie Li, Dan Zhang, Xianjun Meng, Yanbo Chen. A Study of the Security Management System for University Privileged Accounts Linked with Fortification Machines: Practical Research. Academic Journal of Business & Management (2023) Vol. 5, Issue 13: 127-132. https://doi.org/10.25236/AJBM.2023.051318.

References

[1] Liu Qi. Research on Privileged Account Threat Analysis System [J]. Electronic World, 2020(24): 75~77.

[2] Liu Qi. Research and Analysis of Privileged Account Security Management System [J]. Information and Computer (Theory Edition), 2020, 32(21): 198~200.

[3] Liu Xiaoxiao. Establishing a Secure Management System for Information System "Privileged Accounts" [J]. Financial Electronicization, 2009(07): 67.

[4] Liang Haowei. Operational Security Management Based on Fortification Machine [J]. China Informatization, 2021(04): 80~81.

[5] Xu Shenglin. Strengthening the Construction of University Campus Network Operational System to Improve User Experience [J]. Information Systems Engineering, 2021(09): 112~114.

[6] Xuan Hui, Chen Xing. Application of Fortification Machine in Campus Information System [J]. China New Communications, 2018, 20(06): 81.

[7] Peng Guifen, Zhe Mingwei, Han Hua. Preliminary Exploration on the Construction and Application of Fortification Machine in Medical Colleges and Universities [J]. Modern Information Technology, 2019, 3(10): 152~154.

[8] Feng Kuan. Research on Key Technologies and Systems for Privileged Access Security Integration Data Platform [D]. Harbin Institute of Technology, 2020.

[9] Lin Zhida, Zhang Huabing, Cao Xiaoming, et al. Enterprise Information Network Security Protection Model Based on Fortification Machine Technology [J]. Electronic Design Engineering, 2022, 30(18): 179~183.

[10] Zhang Zhe. Application of Fortification Machine and VPN Technology in the Remote Disposal of Emergency Information System Faults in the People's Bank [J]. Heilongjiang Finance, 2021(02): 48~50.