Font Size: a A A

Security Method Research For Constructing Special Network

Posted on:2003-12-02Degree:MasterType:Thesis
Country:ChinaCandidate:G M ZhanFull Text:PDF
GTID:2168360092966699Subject:Electronic and Information Engineering
Abstract/Summary:PDF Full Text Request
Since the beginning of the 2l th century, tbe development ofinformation technique has changed quick l y. 1'he network has becolne animpartible part of the human life. 1'ho sccurity probleIn of the networkhas gradually become an important factor that affccts thc developmentof network information. lIow to tldopt the necessi1ry ilnd reasoflab1emeasures to secure the securi ty of the netwt)rk informittj on system duringthe process of making use of the network resources avai Iably andpromoting the calculator technique's Elppl i cat i ons i s a problem whichneed to be solved ilamediately.In the paper, we ana] yzed ovcry ki nd ()l" soc[Iri ty l(i sks inconstructi ng specia1 network and tl1e secur i ty dcmalI(ls. ()I1 t[lo basi s of 'that, we make systemic rosoarcl1 ()n l f1o s()cllr i ty ilrct1 i t.cc 1.lJre, dcs i gnout the securi ty so.l ut io11;1l1t] s l.cI) i n I,rilc t. i cc () f. s1)t}(t i;l l networkaccording to the security archi tec turc fr;tn1e, wI1 icl1 silt i sI!y the needof confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion,authorization and accountable of specia1 network information system.
Keywords/Search Tags:Specia1 Network, Security Prob1em, Risk, Demand, Security Architecture, Solution, put in practice
PDF Full Text Request
Related items