Font Size: a A A

The Research Of Information Security In The Private IP Network

Posted on:2013-07-22Degree:MasterType:Thesis
Country:ChinaCandidate:X J WuFull Text:PDF
GTID:2268330401453854Subject:Electronic and communications
Abstract/Summary:PDF Full Text Request
Compared with the traditional private line digital network, IP network has the features like open and connection un-oriented. It makes IP network to face to more security risks and threats, and also more difficult to prevent. In order to ensure the security of the IP network and IP message, it is necessary to study the related information security technology.This paper firstly studies the development of information security technology both at domestic and foreign, introducing the features and information security requirements of a certain private IP network, analyzing various safety risk, aimed at different risk especially focus on information encryption and the isolation demand between different networks, design plan and take the following measures.Develop the cipher machine of IP network, to meet the encryption requirements, at the same time also support network protocol transmission, adapted to the private IP network environment, and with improved operating configuration management function.Develop the equipment with security isolation and switching between different networks, in the implementation inside and outside networks security isolation and switching of IP message, at the same time focusing on the development of custom protocol customization features with the good adaptability and flexibility.Comprehensive application of firewall, intrusion detection, antivirus, network audit, access authentication, host control and other security means, build perfect information security system.Through the above measures, information security system of the private IP network can effectively guard against the virus, leakage information, steal secret, and network attack, guarantee the security of information system.
Keywords/Search Tags:information security, encryption, security protection, securityisolation
PDF Full Text Request
Related items