350 rub
Journal Electromagnetic Waves and Electronic Systems №7 for 2016 г.
Article in number:
The analysis of features of the organization of safety of functioning of system of processing of applications for telecom operator
Authors:
N.A. Borsuk - Ph. D. (Eng.), Associate Professor, Department «Computer systems and networks», Kaluga branch of the Bauman MSTU. E-mail: borsuk.65@yandex.ru
Abstract:
In article features of the solution of a task of the organization of safety of functioning of system of processing of applications for telecom operator (Internet service provider) are analyzed. A basis of the project is the section of requests in which users of system can create requests of all types from clients and quickly trace the status of any request. It saves time of processing of requests, and allows to provide to the client the queried information as fast as possible. In a private office the user of system can see all tasks assigned to it, requests in which the user of system is a performer, and separately requests with expiring for executions. In addition users of system can communicate among themselves, means of function of exchange of personal messages. In article development stages of the system in general are described and more detailed attention is paid to the solution of subtasks of the organization of a security arrangement. First of all by development of a similar security arrangement it is necessary to decide on user groups of the application and to classify their powers. In this case four user groups were defined and the circle of problems which each of these groups solves is defined. The following stage - development of the module of registration and authorization of users. It is possible to refer function of registration of the new user, function of authorization of the registered user and function of an output of the user from system to functions of au-thorization and registration. Further it is necessary to solve the problem of a correctness of the data entered into the form for filling. The code of validation of the form of adding of the new task to the user of system is given in article. Features of a framework of Django for incorrect operation with forms of the developed processing system of requests are also considered. Possible ways of further finishing of the project are specified.
Pages: 67-71
References

 

  1. Makkarti Linda. IT-bezopasnost. Stoit li riskovat korporaciejj - M.: KUDIC-Obraz. 2004. 208 s.
  2. Babkov V.JU. Sistemy mobilnojj svjazi: terminy i opredelenija. M.: GLT. 2009. 158 s.
  3. CHaadaev V.K. Informacionnye sistemy kompanijj svjazi. Sozdanie i vnedrenie. M.: EHko-Trendz. 2004. 256 s.
  4. Ivanova T. Kompjuternye tekhnologii v telefonii. M.: EHko-Trendz. 2002. 300 s.
  5. Borsuk N.A. Osobennosti bazy dannykh pri razrabotke sistemy obrabotki zajavok dlja operatora svjazi // Simvol nauki. 2016. № 6-1. S. 50−52.
  6. Borsuk N.A. Razrabotka sistemy obrabotki zajavok dlja operatora svjazi // EHlektromagnitnye volny i ehlektronnye sistemy. 2015. T. 20. № 7. S. 54−56.
  7. Dronov V. Django: Praktika sozdanija Web-sajjtov na Python. SPb: Bhv. 2016. 528 s.
  8. Vatamanjuk A. Sozdanie i obsluzhivanie lokalnykh setejj. SPb.: Piter. 2008. 405 s.
  9. Kurbatov V., Petrenko S. Politiki bezopasnosti pri rabote v Internet. M.: DMK Press. 2011. 200 s.
  10. Melnikov V., Klejjmenov S., Petrakov A. Informacionnaja bezopasnost i zashhita informacii. M.: IC Akademija. 2008. 336 s.