Font Size: a A A

The Research And Implementation Of Security Of Corporation Data Network

Posted on:2010-11-14Degree:MasterType:Thesis
Country:ChinaCandidate:W QiaoFull Text:PDF
GTID:2178360278467789Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The problem of network security become the challenges which we have to face in the information age, the domestic problems of network security have become increasingly prominent. Specific performance: computer system by virus infection and destruction is very serious; hacker has become a major threat; the infrastructure of network is dangerous; the system defense of network security is weak in the prediction, response, and recovery capabilities. So if we do not solve this problem very well, it would be affected the development of information technology enterprises, and even hindered the development of China's information process.In view of the causal and integral about the network security and the network attacks, if there is none network attacks in the network world, it seems not necessary to discuss the matter here. So, in this article, we first talk about the network attacks, first of all, a typical network of the current technical characteristics of aggressive behavior were analyzed, including: denial of service DOS, malicious software, the use of fragile and manipulate IP packets, internal attacks and CGI attacks, and for the characteristics of their related responses. At the same time, continuously updated in response to network attacks, network security technology has undergone from the passive to active protection of the development process of detection. Therefore, this article of the current network defense attacks technology to research, including: firewall technology, VPN, virus-wall technology, intrusion prevention, intrusion detection and vulnerability scanning.Through the research of issues above all, point at the security status of enterprise network, and combine with the first phase of construction of the outcome of business analysis, research how to consolidate the results of the first phase, and further improve the corporate data network security system. Through the enterprise network and data security of the second aspect of the various analysis techniques, combined with security products, provide a complete network security solutions for defense system, and help enterprises to protect the security of internal data network for defensive purposes.
Keywords/Search Tags:computer-network, network-attack, security and defense
PDF Full Text Request
Related items