Font Size: a A A

Research And Implementation Of Host Security Technology

Posted on:2007-07-27Degree:MasterType:Thesis
Country:ChinaCandidate:S LiuFull Text:PDF
GTID:2178360185967832Subject:Cryptography
Abstract/Summary:PDF Full Text Request
As the rapid development of information and network in China P.R. there are serious challenges to be faced, such as hacker intusion, computer virus, all kinds of network criminal, leakage of important imformation and infiltrate of weatern ideology and culture through internet in the country. An important reason of these is insecurity of the computer architecture and operating system. A high-level defense from the end point could efficiently solve the security problem from the source.In order to solve problem from the source, a schema of design and implementation of security system, which is based on host and protect actively, is provided in this essay. It is based on the study of host security and the development experience in network security software project. The availability of using this schema in network will be discussed in the reserve part of this essay.There are four parts in the essay.The first part is consisted with chapter 1 and 2. It is an introduction of content and architecture of the essay. Some background of host security will be introduced. At the end of this part, the requirement of host security system should be determined.Chapter 3 and 4 become part 2, the core of the essay. An active host protect system is basicly established from study to design. The system will be devided into Network protect, System protect and File protect, it will be particularly discussed in chapter 3. In chapter 4, flow of all modules is discussed. At the end of this chapter, the detail structure of system will be given.To make it more powerful the issue that how to use host protect system in network will be discussed further in chapter 5 as part 3. Since it is agreed that...
Keywords/Search Tags:host security, host protection, active protection, centralized management of security policy
PDF Full Text Request
Related items