Font Size: a A A

Research On Security Management And Architecture In The Campus Network

Posted on:2010-12-02Degree:MasterType:Thesis
Country:ChinaCandidate:C ZhangFull Text:PDF
GTID:2178360302964569Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the popularization of the Internet and the continuous development of network construction at colleges, major Colleges and schools have built or are under construction on Campus network. The building of campus network enables schools to achieve a management on Internet and modernization of teaching methods, which is greatly significant to improve school management and teaching quality. However, as more hackers' invasion and network viruses, the campus network security has become a serious problem. And data security and school interests are facing a heavy threat. Therefore, it is important that whether the security and normal operation of computer and network systems on campus network management are guaranteed or not.In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed .It studies the principles of and the approaches to their actualization of a firewall, Intrusion detection system (IDS).VPN and data encrypt network technology. At the same time, the principles and related technology of network security analysis and assessment are intensively dug into.Computer network system should be a system of dynamic defense, both dynamic and static passive as well as active, and even offensive, combined with management and technology. Based on such a concept, the author has developed an all-round, multi-level model of network security system with different defense capabilities, which covers the whole campus. The design and construction of such a model has been completed for the campus computer network of Jiangsu Changzhou Higher Vocational School of Construction after the author's thorough study of the demand of the campus computer network security system. After initial testing and operation, the model proves efficient and feasible.
Keywords/Search Tags:network security, threats an attacks, firewall, intrusion detection system, virtual private network
PDF Full Text Request
Related items