Font Size: a A A

The Network Secutity Design And The Solution Liaoning Unicom

Posted on:2007-06-20Degree:MasterType:Thesis
Country:ChinaCandidate:L QiFull Text:PDF
GTID:2178360212481049Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the development of the Internet, the computer network already becames a national economic basis and the most important part in our life. In order to use the information and resources fully, many enterprises and different organizations and the governments all are setting up and develop their own networks, and connect on Internet. With the growing popularity of the network, the rich resources and the information give us not only so many conveniences but also some the security problems. There are lots of natural and artificial problems about the local network and WAN. Therefore, the network security measure should deal with all kinds of threats and vulnerabilities, which can make sure the secrecy, integrity and usability of the network information. In order to use the information freely, it is necessary to study the security and defensive measures of the network.At first, this article carries on the summary to the network security, and discusses the network security characteristics. Then aming at the security theats summed up, we do research to five kinds of safety technology, such as Firewall, Invsion Examination, Encryption, Status Authenticaton and Anti-virus technology.In addition, from what has been discussed above, this article described the current condition on security system construction of Liaoning Unicom and analyzed the level demand of the information system construction. (Including physical level, network level, systematic level, application level and safe service level).At last, it gaves the practical plans by analyzing security risk reasonably (anti-virus system, firewall system, loophole appraised system, real-time invasion examination system, dynamic status authentication system and so on). It also made product disposition plan of Liaoning Unicom.
Keywords/Search Tags:Network Security, Firewall, Invasion Examination, Loophole Appraised, Dynamic Status Authentication
PDF Full Text Request
Related items