Font Size: a A A

Study And Application Of Security Technology On The Platform Of Connection Exterior Network

Posted on:2008-04-20Degree:MasterType:Thesis
Country:ChinaCandidate:R X CaiFull Text:PDF
GTID:2178360242971365Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Attribute to the openness of internetwork protocol, the diversity of internetwork connection and the uneven distribution of terminals, together with other characteristics, the internet are vulnerable by hacker or malicious software and other illegal attacks. So, the information which delivered on internet are possibly leaked or steal, tampered with or counterfeited, or even destructed and infected by virus. Therefor, in information age, the network security are most important and crucial issue.Network security measures should be all-round to cope with all kinds of totally different menace coming from internet in order to ensure that the confidentiality, integrity and availability of information while they are transferred on line.Nowadays, thought as information age network exist everywhere. It is quiet common to see that connection are established between different enterprises and between enterprises and internet in order to bring in full advantages of network We'd better adopt different strategies to deal with different situation because dissimilar connection among different sub-nets of enterprise or internet need quiet diverse security level and suffered different menace. This paper has done lots of research basing on the current network security technology and strategy, as well as on analysis of drawback for the current application of network connection including following points:①Analyzing the causes of the network security problems and the normal attack ways and counter-strike means.②Analyzing the tasks of the network security and the systematics and perfectibility for constructing the demand of network. Security.③Studying the tools and strategy for network security, including cryptographic techniques, system security technology and network security technology. In detail, are firewall, access control technology, security routing ,strategy routing technology, encryption, authentication and key management technology, intrusion detection and vulnerability scanning technology, VPN / VPDN technology.④We will use a financial enterprise Extranet as a example to illustrate how to build a safe, sound and efficient external network platform taking on a regional separate framework strategy in terms of comprehensive consideration of all different technology(presented in point 3) and levels of network security. In this paper, we will analyze the present situation of network security deeply, while we will construe the technology and strategy of network security. So, It is have great theoretical and practical values to use a financial enterprise Extranet as a example to illustrate how to build a safe, sound and efficient external network platform from different technologies...
Keywords/Search Tags:Access Platform, regional security framework, safety technology and strategy, Integrity, availability
PDF Full Text Request
Related items