Font Size: a A A

The Research And Application Of Level Protect In Large Enterprise Network Security

Posted on:2009-03-25Degree:MasterType:Thesis
Country:ChinaCandidate:J MaFull Text:PDF
GTID:2178360272974758Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As China speeds up its process of Informationalization in all fronts, the dependence of national economy and social development on the fundamental information networks and critical information systems becomes significant. Information security draws more and more attention from IT professionals. As an essential part of basic Information Security system, Information Security Class Protect plays a very important role in protecting the security of fundamental information systems in government and company. Classification protection system for Information security is an important aspect of national information security, and a political task for national security and social stability. However, information Security Class Protect in China is only in its primary stage of development, with no valid models or tools readily available in this area. Classification protection is a great demand for the current situation of information security.This paper mainly introduces the Network security situations,reserch and policy on domestic and foreign markets, and research the Classification protection system, security domain and risk assessment. We propose the security requiement of network for large-scale distributed enterprise, and discribe how to resolve the network security and application security. Especially, we give a detailed requirem analysis according to the technical and managing security and make a reasonable security goal.At last the part of the paper, specific integral solution is given according to practice experiences and the analysis of security requirem.. The model of integral net- work structure is introdueced, as well as the corresponding products and technology in it. When the system is conceiving, whole of the integral solution of network uses the theory of system analysis engineering. We considered the integral security problems according to the integral system. This method has systematicness and practicability, so we hope it could be used in the companies which have the correlative security requirems.
Keywords/Search Tags:Network Security, Classification Protection, Security Domain, Risk Assessment
PDF Full Text Request
Related items