Font Size: a A A

The Implementation Of Boundary Security Technique Of Intranet

Posted on:2003-12-28Degree:MasterType:Thesis
Country:ChinaCandidate:B LiaoFull Text:PDF
GTID:2168360092466696Subject:Electronic and Information Engineering
Abstract/Summary:PDF Full Text Request
The internet security has been the key factor which restricts the application of electronic administration. What made the situation worse is the facts that the exploitation and utilization of internet security technology lags behind the application technologies at large . Based on all these,such questions are being advanced as how to understand and utilize the latest theories,models,and technologies when internet securities are concerned,and whether the traditional theories relevant to the internet security satisfy the requirements of the completely new situation. All these questions should only be solved and proved through engineering method and technology realization.In this dissertation,the author tried to illustrate the purpose and aims of internet security by giving a new idea of the boundary of traditional LAN . Using the PPDR theory,also combining with a real instance and the monitor-auditing software already developed,the author proved the validity and the applicability of this theory model both theoretically and practically .furthermore,illustrated how the security technology strategy is formed and applied by using the reasoning method of system engineering science,hence,advanced a good instance as to how to thoroughly fulfil the internet security engineering.
Keywords/Search Tags:Intranet security, Monitor software, Technology application, Engineering demonstration
PDF Full Text Request
Related items