The study concentrates on the status of ecological environment development in Shenyang, uses the remote sensing images and social statistics in different periods as the data base, establishes a dynamic monitoring system and model of urbanization and ecological security. Through the identification and quantitative analysis of ecological security dynamic monitoring information, with the support of spatial information technology, we have formed a key technology system which combines ecological security warning with ecological security structure optimization. Moreover, the spatial database of ecological key elements in Shenyang city was constructed. The vertical pattern, horizontal pattern and ecological function of urban ecological system is organically combined, which provides the basic data for the layout and regulation of green space and water system. With these efforts, a key technology system is formed, including the warning of urban ecological security- the space regulation of economic development- the optimization of urban ecological security pattern - the regulation of urban elements' spatial layout. The research results provide scientific and accurate data base for ecological planning and regulation in Shenyang City , carry out effective ecological security monitoring and management for the development of Shenyang, protect the ecological integrity of the system as well as the healthy development of the economy in Shenyang City during the urbanization process .
Corporation’s valuable intelligent asset is being threatened from the skills of threatening subject that has been evolved along with the growth of the information system and the amount of the information asset. Domestically, attempts of various private information attacks, important information extortion, and information damage have been detected, and some of them have abused the vulnerability of security of information system, and have become a severe social problem that generates security incident. When accessing to the security, most of companies used to establish a strategy with a consistent manner and a solution plan. However, this is not a proper way. The order of priorities vary depending on the types of business. Also, the scale of damage varies significantly depending on the types of security incidents. And method of reaction and critical control point vary depending on the types of business and security incidents. In this study, I will define the security incidents by their types and preponderantly examine how one should react to those security incidents. In this study, analyzed many types of security accidents that can occur within a corporation and an organization considering various factors. Through this analysis, thought about factors that has to be considered by corporations and organizations when they intend to access to the information security. This study focuses on the response methodology based on the analysis of the case analysis of the leakage of industrial secret and private secret other than the conceptual response methodology that examines the way to prevent the leakage of the industry security systems and the industry information activities. And based on these factors, want to be of help for corporations to apply a reasonable approach when they establish a strategy to information security.