Font Size: a A A

Eesign And Implementation Of Ji'nan Military Brigade-Level Information Network Security Policy

Posted on:2012-09-21Degree:MasterType:Thesis
Country:ChinaCandidate:Z YanFull Text:PDF
GTID:2178330338993318Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In modern times, with network technology and computer technology developing rapidly,network becomes widely spread around the world. On the one hand ,people are enjoyinggreat convenience , availability ,timeliness that network brings, on the other hand ,they haveface security problems from network, such as hacker attacks, computer virus, systematicloophole . According to the security requirement of Ji'nan military network, combiningtechnology and method of network security system, security solutions are seriously analyzedand studied.This paper analyzed the various factors influencing network security, stated specificsecurity needs of the military network in detail and explained the significance of set theinformation network security. Encryption technology is introduced in detail, involving severaltypical encryption algorithms, such as the symmetrical and asymmetric encryptionmechanism. Based on these analyses, declaring strong demand for encryption technology ofmilitary information net. Encryption technology is used for the realization of data integrityand secrecy. Taking advantage of effective encryption technology mainly, and applying thelatest web technology, this paper analyzed and designed the security mechanism of Ji'nanmilitary brigade level information network security mechanism. A small encryption U platesystem related to this study is introduced and achieved. This paper introduces the networkexchange technology and information network topology in detail. Finally, experimental test isconducted to inspect safety performance of the network platform, including the testenvironment settings and test results of assessment.
Keywords/Search Tags:Security strategy, cryptographic technique, Encryption U disk, PermutationCode
PDF Full Text Request
Related items