Font Size: a A A

The Information Security Assessment And Key Safty Precautions Of Container Terminals

Posted on:2009-11-16Degree:MasterType:Thesis
Country:ChinaCandidate:L MaFull Text:PDF
GTID:2178360275970275Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the economic globalization and the rapid development of foreign trade, transportation has become the main direction of shipping industry now and future. To improve the efficiency in loading and unloading, many kinds of hardware and software systems and new technology has been applied more and more in the terminals. These new applications have improved the operational efficiency, but also caused a lot of security problem. At present, the information security measures of China's container terminals are very weak. We must seriously analyze the reasons impacted the information security to assure the safe and effective container terminal operations.This paper begins from the cable network and briefly introduces the several security risks of the current cable network. It proposes several key technologies base on the actual situation container terminal, such as IPS intrusion prevention testing, IPSCAN for prevent potential attacks from outside, IPD to enhance user's desktop management system Function, WEBSENSE for the Internet filtering.This paper focuses on the information security of WLAN in container terminal. It introduces the characteristics of WLAN and WLAN hardware components, including wireless NIC, access points and antennas. It also analysis some potential security threat of WLAN based on the physical structure. Then, it introduces WLAN transmission agreement 802.11 family and its functions and principles of the MAC layer and physical layer, and analysis the security flaws and solutions at last. This paper introduces the principle of WEP, and then analysis its potential security risks and attacks on the encryption, key management, IV reuse, authentication, integrity algorithms, and other aspects of the safety. At last it introduces the security risks and attacks the WEP may be encounteredAt last this paper introduces the AES encryption algorithm, EAP protocol and RADIUS servers, and proposes an improved solution of WLAN security based on WEP. Then, according to the operational situation of container terminal, it proposes a unified-WLAN security solution combined with LWAPP, which operates the container terminal effectively and intelligent. Also this solution has adopted the improved solution of WLAN security based on WEP proposed before, making the solution more complete.
Keywords/Search Tags:CONTAINER TERMINAL, WLAN, INFORMATION SECURITY, WEP, LWAPP
PDF Full Text Request
Related items