Font Size: a A A

Design And Implementation Of The Information Network Of Nanping Tobacco Company Based On Security Domain

Posted on:2014-10-08Degree:MasterType:Thesis
Country:ChinaCandidate:X F GuoFull Text:PDF
GTID:2268330425468430Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In this thesis, the partition of security domain for the network architecture design ideas, taking Nanping tobacco network reconstruction planning and implementation process as the background, on the basis of the tobacco industry related standards, combined with the tobacco companies business system requirements, will be divided into information network into different security domains for protection and management. For the protection of hierarchical focused on each security domain, a large and complex networks into each small safe area network design.The flow of data through analysis of Nanping city tobacco companies information network status and application system, the construction of a clear structure, safe and reliable, flexible extension information network based on the objectives, to solve the network problems. In line with safety, practicality, investment protection principle. Based on the existing information network structure, the information network is divided into core domain, business server domain, floor access domain, IT domain, wide domain and outreach domain, A total of six security domain.On the basis of the partition of security domain, according to the characteristics of each security domain and puts forward the corresponding security requirements and protection measures to promote the security management of the deployment region. Strengthen the physical protection level through the safety protective equipment to deploy security domain boundary; through the AC1access control, firewall, intrusion prevention system and other measures to access internet security; vulnerability scanning, the security configuration of reinforcement, anti-virus system, personal identification, security audit, internal security technology management measures.Finally, the network security products selection according to the designdemand of the equipment. Good results have been achieved through actual implementation project.
Keywords/Search Tags:Security domain, Information network, Security strategy
PDF Full Text Request
Related items