Font Size: a A A

Research On Application And Strategier Of Security Management Of Computer Terminals

Posted on:2009-07-19Degree:MasterType:Thesis
Country:ChinaCandidate:F ZuFull Text:PDF
GTID:2178360245469828Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The desktop PC or laptop is the point of entrance to the network and data for most users but many organizations fail to include these computers in their security strategy. Often the enterprise will establish a firewall and network security, focusing most of their energy on protecting their data from outside intruders and leaving their desktop and laptop computers open to intrusion, modification of system and data or even data theft. So it is very important for the enterprises to manage their computer terminals in an efficacious way.The purpose of the essay is to solve the problems mentioned above. Firstly, this essay analyses various threats to computer terminals and introduces some technologies relating to the management of computer terminals. And then specific security policies were given for the threats analyzed above. Secondly this essay proposes an architecture of the management of desktop PCs or laptops. The architecture is made up of four subsystems, including domain management, access control, patch management and system monitor. The functions for each subsystems and the relationship among the subsystems are designed thoroughly. The interface with the system with other system is expounded too. Finally, on the basis of concrete situation of some company, this easy implements the application of the architecture using specific technologies and security products.The architecture given in this essay can help enterprises to establish the appropriate system to manage their computer terminals, which can improve their employee's the work efficiency; reduce the risks of terminal, protect their hardware and software assets and reduce the their costs for operating business.
Keywords/Search Tags:Terminal Security, Management of Terminal, Security Strategy, Terminal Security
PDF Full Text Request
Related items