Font Size: a A A

The Design And Implementation Of Northeast Securities Intranet Endpoint Security Management System

Posted on:2011-07-21Degree:MasterType:Thesis
Country:ChinaCandidate:P Y LiFull Text:PDF
GTID:2178360305454973Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, the computer networks in government agencies, military, enterprises and business organizations have expanded at a staggering speed, especially the internal local area network (LAN) of enterprises. The problems of information security in those internal LAN, however, have become more urgent and obvious than ever before. Therefore, it is vitally important to solve the problems posed by information security– in particular the internal LAN of corporations.Currently, protecting the information resources is the primary means adopted to promise information system safety, that is, to protect networks and servers according to existing security knowledge. But the protection is usually unsatisfied because it ignores the defense of terminals. And this is a very misunderstanding of information security as actually many potential safety hazards are resulted from those terminals. If all of the terminal users can follow the regulations of security policies in their operation, then the entire safety of information system is more easily to be guaranteed. As such, the safety problems will be better resolved and more efficient defense systems will be built if we proceed with the management of terminal safety.The key point in the work of information security is to figure out a way that people can exploit remote probing techniques to set up a reliable security management system of internal LAN in corporations in order to resolve large volumes of problems in computer safety management and to strengthen the security of computer networks terminals. Targeting those problems, we have analyzed the threats to terminal safety in the internal LAN terminal management, constituted an integral defense strategy, and designed a compatible architecture of LAN terminal safety management for our unit in order to put the integral defense strategy into practice. The architecture includes four subsystems which are domains management, patches management, access control and platform monitoring respectively. This essay analyzes the functions of those subsystems, introduces corresponding management procedures and policies, and illustrates the relationships among the four subsystems. Interfaces of this architecture and other application systems are also discussed. Finally, combined with the present deployment of our unit and related technology and safety products, we implemented a particular applications of this architecture and subsystems. Also we will give detailed analysis and corresponding policies of the security of this architecture to ensure that our system be operated correctly and efficiently as with our expectations.The security protection system of the internal network of our company is perfect. The use of firewall system and invasion prevention system has protected the external security threat to the minimum. But we still have insufficient techniques to prohibt the illegal information access and outreach, which seriously threat the safety of internal network. On the other hand, frequently happened virus events also decrease the working efficeincy of employees. Through the analysis of the reasons for the connection problem, we find out the causes that lacking the effective management of terminal network and terminal management. Because there are still many loose, network terminal system vulnerabilities those are not timely repaired, some connection terminal systems are weak in passwords, abuse of mobile storage medium to wanton spread Trojan virus, even exists outside the illegal malicious code violations of the site, the external personnel access company Intranet, these reasons are directly or indirectly resulted in network security incidents frequently. Therefore, revolveing the security events from roots is the most important work for us.The desiganation of the system follow the roles of both technology and management tools, network security and host security. For information within the network to provide major security threats faced by the appropriate security solutions, enabling information terminals within the network a comprehensive security management. Terminal within the network security management system is a systematic, modular, hierarchical system architecture design. To enhance the security of internal network terminal condition monitoring and testing, provision of external security measures can not achieve security protection. Implementation of information security management within the network terminal unified platform, while the network switches, network security gateway integration and linkage to achieve reunification and achieve the overall security of the information systems within the network.The desktop security management system of Northeast Securities Company works through Web-application strategy of the entire system configuration, alarm management network and query data. This system is easy to operate and effectively prevent insecurity threat to the internal network, truly comprehensive internal network security management. It is a powerful tool for the protection of internal network of system resources and data resources, the safe use of powerful network management tools. It is for large and complex network structure provides a highly people-oriented management and convenient operation interface, which can effectively control and prevent information security incidents.
Keywords/Search Tags:Intranet endpoint security management, Host detection, Network Security, Patch Management
PDF Full Text Request
Related items