Font Size: a A A

Enterprise Security Analysis And Solutions

Posted on:2009-11-01Degree:MasterType:Thesis
Country:ChinaCandidate:Z CuiFull Text:PDF
GTID:2178360278462648Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of information technology, many enterprises have begun to use information technology tools to enhance their competitiveness. Information security issues are becoming in the process of enterprise information to be resolved. The purpose of this paper is to analyse the information leak as the major phenomenon of information security by the presence of potential safety problems and made a complete viable option.This paper briefly described the definition of information systems security and network security of the status quo, proposed in this paper to be solved, namely how to ensure that the enterprise network and application of information security. And then from their own perspective and listed the legal requirements to do a good job explaining why the enterprise information protection and made a set of information security policy objectives. Then a concrete analysis of information leakage through the channels from both inside and outside the two partial solutions to the issue of information security programme thinking.Through analysis of the external threats to invade the principal means and the establishment of the measures, while the internal security loopholes and is also a risk analysis and the corresponding final solution for a company's actual conditions, put forward a comprehensive set of information security And for the implementation of the programme.In this paper, the significance lies in the fact that through the entire enterprise facing the issue of information security analysis and research, is a reliable, practical, cost-effective programmes, not only for the implementation of the designated target enterprises, other enterprises on the analysis And solve the security problems are quite common reference and guidance.
Keywords/Search Tags:Information security, external intrusion, internal security, solutions
PDF Full Text Request
Related items