Font Size: a A A

Study And Construction Of Internal Information Network System For Sanjiang Group

Posted on:2004-06-28Degree:MasterType:Thesis
Country:ChinaCandidate:H L DengFull Text:PDF
GTID:2168360122965486Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
The buildup of information network security system is a complex systematic project. It involves a variety of factors such as security organizing framework, security technique, security management regulations. This thesis presents the group network security requirements based on the Sanjiang Group's secrecy requirements for information setup and application and via analyzing the in being status quo of information system security and existing risks earnestly, improvements and reinforcing design for the group's internal networking security based mainly on the study of security strategy, security technique and security management, etc combining with the relevant networking security products, and measurement of three phases implementation. The first phase construction of group networking security determined the organizing framework of security management, established integrated security strategy and networking security management system, and solved the problem of uniform defense and concentrated control for the whole network virus, the security problem of transmission of the DDN special line, and the problem of accessing control of the important networks and networking servers by combining with corresponding security technique , anti-virus technique , firewall technique , invasion detected technique , and risk evaluation technique, etc, and implemented the security defenses for the weakest level (transmission security of inter-region mainline network) and kernel level (multi-LANs in first class secret units) in the system. By summarizing theimplementation and practice in the first phase project, we accumulated some practical experiences and established a stable basis for the group's internal network construction.
Keywords/Search Tags:Information Network Security, Security Policy, Security Technology, Security Management, System Construction
PDF Full Text Request
Related items