Font Size: a A A

Chongqing Institute Of Technology Campus Network Security System Design And Implement

Posted on:2009-08-26Degree:MasterType:Thesis
Country:ChinaCandidate:L LiFull Text:PDF
GTID:2178360245989531Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the global information-based processes continue to promote, Education Network , as an important component of the Internet, is constantly developing. The further development of school network in higher education institutions definitely plays an important role in strengthening information and resource sharing, and improving the work efficiency. When users take advantage of the convenience of working online, the security problem of school network arises. Notably in recent years the security events of school network are happening one after another: Worms, DDos and other new attack methods are emerging endlessly and becoming increasingly complex, which often resulting system failure and data sabotage as well as other serious consequences. It heightens users' awareness of the importance of network security. Therefore, how to build a reliable school network security system in those higher education institutions becomes a question that should be given priority and tackled immediately.An information system in Chongqing Institute of science and technology has been built for computer connection and information sharing in campus based on the advanced technology of computer and communication, and some transaction application system based on B/S and C/S has exploited. The primary task of the updating the information system is building a perfect security structure.The paper raises adaptable dynamic network security model which bases on the actual construction of Chongqing Institute of science and technology new campus. A security plan is designed according to this model, and the security request and security target are recognized in accordance with the analysis of whole threat for Chongqing Institute of science and technology. And according to structure of the model, firstly, we conduct the security risk of six aspects, respectively from the physical layer, network layer, application layer, operating system and management. Secondly, it designs a security plan taking advantage of the combination of active and passive defense technology. The security plan can meet the security requirement of system from six sides: physics security; network security; system security, mainly for OS security; business application security; Safety audit and management rules. Finally, it gives a scheme for how to implement the security plan gradually, and we choose some of the experiments which verify the security plan.The security plan has been partially implemented in the network of Chongqing Institute of science and technology. The network operation shows that the security plan is reasonable, and accords well with the requirement of security.
Keywords/Search Tags:adaptable dynamic network security, security requirement, security risky, security plan, security implement
PDF Full Text Request
Related items