Font Size: a A A

Research And Practicing Of Enterprise's Information Security In Anhui TELECOM

Posted on:2008-08-27Degree:MasterType:Thesis
Country:ChinaCandidate:H L CengFull Text:PDF
GTID:2178360215951025Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the fact that global economy integration and the IT leap develop, IT and IT industry become a main part power of driving country and region economic growth. Information security vs cyber crime , the information explosion vs information mass , individual right of privacy vs protecting culture variety , are new challenges that informatization bring to modern enterprise. Enhancing security of the system, already is one of the important difficult problem needing to be resolved in enterprises.Anhui TELECOM is an important communication provider of Anhui province, the DCN network of Anhui TELECOM is a IP network which covers the whole province, bearing all application systems and network management systems of the relevant speciality that CTG-MBOSS contains, it guarantee the security of the network platform itself, and the security of the system being beared, in order to provide information on sustaining in enterprises the security management and protection are very important, therefore carry on research into enterprise's information security practice of Anhui TELECOM has high using value of projects.This article has analysed the importance of enterprise's information security at first, through finding out about the development of the domestic and international information security and assessment standard, and the popular realizing technology of information security. After analysing the current situation of Anhui TELECOM'S network, the article have put forward the main content with enterprise's information security of Anhui TELECOM and the solution, and have stated the feasibility of a scheme. At the same time, this article combine real working experience, after analysing principle on dividing security region, put forward the dividing method and building scheme for security region in the scheme, and after using in practice, have analysed in detail, meanwhile, put forward the significance of the security management of dividing security region and bring problem needing paying attention to.
Keywords/Search Tags:Enterprise information security, Security authentication, Security region, Classified protection, Boundary
PDF Full Text Request
Related items