Font Size: a A A

Planning And Implementation Of Network Security In Jiangxi MCC Data Network

Posted on:2009-05-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y GuoFull Text:PDF
GTID:2178360245969363Subject:Data network security
Abstract/Summary:PDF Full Text Request
JiangXi MCC Data networks for all mobile data communications,management, and maintenance,Jiangxi MCC data communications network security management need to establish the scientific,effective and comprehensive basis.In order to protect the security of data communications network operating, there is an urgent need to use advanced network security doctrine,developed network security strategy,adjusting the deployment of network security, and establish a perfect network of Jiangxi MCC Data Communication Network Security System.In this paper,model systems to P~2DR theory and network security technology as a guide,with Jiangxi MCC data network characteristics of the Jiangxi MCC data communications needs of the analysis,and established a needs analysis consistent data communication network security system.Through the implementation of the project,the deployment of the relevant security products,and printed sound management system,Jiangxi MCC has developed a mobile network system security system.In this paper,two aspects of the theory and practice of the system in detail on the design,structure,process and the implementation of the relevant technical points.The following is the main task of this system:1.Has conducted the thorough careful research to the P~2DR model's dynamic network security system,lays the technology base for the design construction Jiangxi MCC data network security system.2.Carries on the Lamination analysis to Jiangxi MCC Data Network in the security aspect demand,separately from the environment and the hardware,the network level,the operating system,the database level, the application layer and the operation level,summarizes the security essential factor according to the demand,forms the safe integrated demand frame,formulates the entire security policy and the security project implementation plan.3.Through scanning and vulnerability assessment to identify Jiangxi MCC data network equipment and systems security loopholes and hidden dangers,and all sorts of means removal of network equipment,software and mainframe systems at all levels of security vulnerabilities.At the same time,use of P~2DR model dynamic network security system theory and technology for mobile data communications network in Jiangxi Province to build an enhanced security system protection.Successful points and the innovation of this paper:1.The dynamic network security system of P2DR model has been Applied successfully in Jiangxi MCC Network security systems,enhanced mobile data communications network security protection.2.establishing printed sound management system of Jiangxi MCC Data Network.3.Realizing reunification of the entire network administrator identification / authorization / auditing system deployment,we use RADIUS and S / KEY(or Secure ID)technology combine to meet the centralized authentication Jiangxi mobile network equipment for the backbone network identity needs.The use of the local host device authentication and encryption combination of communication methods, such as tapping password can prevent network attacks,network authentication in ensuring safe and effective under the principle of maximizing the use of network resources and corporate overhead savings.4.Realizing reunification of the entire network configuration and management of the deployment of anti-virus system;system is the world's leading anti-virus packages TVD achieve the unity of the entire network configuration and management of the anti-virus system.5.Using true centralized management invasion examination system;From backbone point's Real Secure Workgroup Manager,will carry on the unification to its subordinate various points the Sensor monitoring strategy disposition,the security incident which Sensor discovered real-time will report that will give Manager;May also complete to each Sensor security features storehouse's promotion from the Manager unification distribution.
Keywords/Search Tags:data network, P~2DR model, security requirement, security system
PDF Full Text Request
Related items