Font Size: a A A

Applied Research On Network Security Technologies And Strategies On Campus

Posted on:2008-07-06Degree:MasterType:Thesis
Country:ChinaCandidate:Z M AoFull Text:PDF
GTID:2178360215490765Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In the information era, the development and application of computer network technology becomes more and more influential on the life styles of human beings. Internet technology has been widely used in every field of society. The security of computer network has become very severe. It is a matter of great urgency to guarantee the security of network. To solve the subjects of network security have also become jobs which have very important theoretical meanings and practical significance. With the rapid popularity of Internet, many campus networks have been set up or are going to be set up in many universities, colleges, middle schools and primary schools. The benefit of which is that network managements and modern teaching methods have become possible in many instructional organizations, which is also very important for the development of improving school management standard and that of teaching qualifications. It has been supported by many facts that the security problems of campus network and data resources are very prominent, otherwise, the interests of the schools will be under the threats of network system break-down. So it is a matter of great importance on campus network managements to guarantee the securities of computers, network systems.This thesis research main content as follows:①.In this thesis, the author firstly discussed the present security situation of computer networks, and the backgrounds of the research, then, he summarized how to achieve network securities by using security strategies and security technologies. The author introduced four strategies, which including environmental strategies, security clauses and duty strategies, service- provider strategies. He also introduced some commonly used and other new techniques in preserving network security, which include: firewall techniques, techniques in anti-virus, cipher techniques, identity identification, visiting-control techniques, safe scanning techniques, data copy and data restoration techniques and VPN techniques, etc. At the same time, on the trend of future development of the network security strategies in the future, the author expressed his own opinions.②.The author explored the application of network security strategies on campus. From the campus net overall plan construction, campus network aspect and so on security hidden danger elaborated the construction security campus network importance, how unifies through the theory and the practice studies carries out the campus network security guard system, the author mainly explored network security strategy campus net practical application.③.The author explored the application of network security techniques on campus. Obtains the related campus network security through the consult pertinent data of the theory knowledge and the first material, As a network management administrator for several years, the author also shared his own work experiences with us on how to use the network security strategies. Then by referring to the experiences of other countries and on the basis of the present positions as a network administrator, the author mainly explored how to use network security technology to solve the campus network security problem with emphasis.④.In the campus net security research, The author research the area of technology content in the campus network security construction application, the author also discussed the non-area of technology in the campus net of safe constructional application (system, policy, management, safe consciousness, entity security and so on). To solve the effective safe system should be take the security policy as a core, take the security technology as the strut, take the safe control as the realization.
Keywords/Search Tags:Network Security, Security Strategies, Security Techniques, Campus Network, Safe Application
PDF Full Text Request
Related items