Font Size: a A A

Design And Implementation Of Secure Domain Partitioning And Boundary Integration Solutions For Provincial MDCN

Posted on:2009-12-12Degree:MasterType:Thesis
Country:ChinaCandidate:G Y LiuFull Text:PDF
GTID:2178360278466072Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Nowadays, network security is not an unfamiliar topic for the telecom operators. With the transformation of telecommunication network from an information transmission channel to a diversified network platform, telecommunication network provides not only basic network services but also the important value added services, such as Co-location services and data center services.With the continuous expanding of telecommunication network equipment scale, the deeply development of telecommunication business, the increase of telecommunication network system openness, the Internet security threats are arriving. As the telecommunications industry is based on the Intranet system, and covers local area network and wide area network, it faces all kinds of different security threats.MDCN (Mobile Data Communication Network) is an open network applied TCP/IP technique, and carrying provincial mobile information system. It is the Intranet of mobile companies, and involves system interconnection, information-sharing relationship with Internet, SP, partners, subsidiary unit, as well as the in-company vital supporting system (network management systems, business supporting systems and enterprise information system). All these factors determine that it is very easily to be interfered by a variety of network security incidents.This paper focuses on the current security problems of MDCN on the provincial level, and mainly finish the following work to ensure the safe operation of MDCN:1. The provincial level MDCN structure, the coming secure risk are detailed analyzed. Considering the potential secure risk, the corresponding security needs are provided. 2. The threat levels of different systems connected with MDCN are analyzed, and in conjunction with the protection grade, the protection grades of every system are defined.3. The principles and methods of security zone division are provided, and MDCN is optimized and adjusted from the three aspects: local area network, wide area network and terminal access. To meet the practical managing needs, the model of MDCN security zone division is provided and MDCN is divided into security domain, security sub domains.4. Boundary of every security zones are integrated, and the principles and the implement of program of security zone boundary protection are provided.
Keywords/Search Tags:Secure Risk, Secure Domain, Boundary Integration, Boundary Protection
PDF Full Text Request
Related items