Font Size: a A A

Design And Implement Of Network Security Protect System In Three Gorges Cascade Dispatching Center

Posted on:2007-05-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2178360185474715Subject:Computer technology
Abstract/Summary:PDF Full Text Request
There are many risk factors in the electric power enterprise due to the continual informationlize progress and the deeper application of computer and network technique in the electric power enterprise. Set up and consummate the enterprise network security system is necessary in the informationlize progress of a electric power enterprise in order to avoid the accident caused by the attack to the system and network of dispatching automation system and ensure the safety of electric power system . There are the strict rules made by the government about the using of physical isolation, firewall and IDS in a enterprise. It influence the system design of Three Gorges cascade dispatching center much because the epical application in data in Three Gorges cascade dispatching center.This article introduces the concept of network security problem and automation system of Three Gorges cascade dispatching center in brief and point out the purpose and meaning of this article in first, then analysis the actuality and risk of Three Gorges cascade dispatching center network and set down the basic principle and objective of the network security system design. After that, the article discuses some network security technique just like host computer protect, physical isolate, firewall and IDS. According to the fact situation of Three Gorges cascade dispatching center, article introduce the basic information of the automation systems of Three Gorges cascade dispatching center and analysis the problem and the request of network security system in the Three Gorges cascade dispatching center. Then the article design the whole scheme of the network security system: first divide the security area, then design the network security rules between the areas and the network security rules inside the area. Then the article introduce some network security devices and the type, technical characteristic and application method of the device and describe about the implement steps in detail which include how to deploy the device, how to set up the database of MIS, how to apply physical isolate device, how to design the network security software and how to use these exchange data in MIS. At last, the article introduces the application of the system and makes the conclusion and the expectation.
Keywords/Search Tags:Electric industry, Network security, physical isolate, firewall, Intrusion Detection System
PDF Full Text Request
Related items