Font Size: a A A

Application In Campus Network Of The Radio And TV University Of Maoming Of Safe Practice Of Network

Posted on:2007-07-29Degree:MasterType:Thesis
Country:ChinaCandidate:Z W ZhuFull Text:PDF
GTID:2178360212959446Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the extensive application of computer network technology, security problem could not be ignored. Computer network, as an open system, has to face up to various threats and attacks. So the establishment of a network security system is crucial and it involves aspects from the hard ware to the soft ware of the system. In this paper, the concept of network security and security structures of OSI and Internet is introduced and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system (IDS), an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the...
Keywords/Search Tags:Application
PDF Full Text Request
Related items