Font Size: a A A

Netinfo Security Of Small And Medium-sized Enterprises

Posted on:2011-08-01Degree:MasterType:Thesis
Country:ChinaCandidate:X H YuFull Text:PDF
GTID:2178360305955145Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Recently, more and more people have a great interest in enterprise informationization。As the foundation of the company, information network accompanies our lives. As the rapid progress of the computer technology, information network becomes an important assurance of the development of society. Companies become more and more relying on information network. However, the rapid development of network makes the network security more and more complex. Many companies pay a great attention to network security and establish under controlled and reliable information network.In China, Enterprise informationization was used later than the more development countries, meanwhile, a lot of small and medium enterprises has no concern on how to make a reliable network architecture。It is much easy for small and medium enterprises make network architecture than large ones, but small and medium are less in network manager, and some are even have no network manager. Therefore, how to make safety network architecture for small or medium enterprise?By researching on Jilin petrochemical design institute, "Netinfo security of small and medium-sized enterprises" analyzes the requirement of c and find out how to make network architecture, according to the current human resources and material resources. Finally, the this get the experience of how we make safety network architecture。The problem of network security in small and medium enterprises is the background of "Netinfo security of small and medium-sized enterprises". The thesis state a method to resolve the network security problem, such as Viruses and Trojans,information stealing,business efficiency. Firstly, the enterprise should establish the strategy of network security. Secondly, the enterprise should unvalued the network environment for enterprise may exist for network security hidden danger of network risk assessment and make sure which should be prevented firstly. Thirdly, the enterprise should choose the proper instrument.In the establishment of network security strategy, highlight the "five non-principle":1. "Would not be permitted" - Availability: authorized entities have access to data so that users can not enter the illegal enterprise network.2. "Not out" - controllability: control the flow of information within the mandate and method of operation, so that within an enterprise network business secrets are not leaked.3. "Not read" - Confidentiality: information is not exposed to unauthorized entities or processes, so that unauthorized people to get the information industry also read.4. "Powerless to change" - Integrity: to ensure that no unauthorized modification of data.5. "Does not go off" - to review: on emerging security issues and means basis. Subsequently, in the "five non-principle" based on the risk assessment according to the network, given the need to protect the network security company focused on: 1. to focus on protection of servers and storages, less protection of single computer. 2. Border Protection is the key. 3. "Zone" protection. 4. Personal Computer protection.By now, the article demonstrates the small and medium enterprises in information theory; network security architecture should have the basic form. But the real network security architecture should also take into account the costs of inputs and equipment selection. Therefore, the paper proposes the concept of ROI: return on investment = (expected annual loss - be expected to implement safety measures after the annual losses - investment cost) / investment cost. By this formula, we can secure the enterprise's investment in the network to conduct a preliminary estimate. Then, this paper presents network security architecture to create the final link: equipment selection.How to choose the right equipment and software, network security architecture is an important part of the firewall as an example to illustrate the article what kind of equipment is suitable for enterprise security products.From the theoretical level, discusses the building of small and medium enterprise network architecture procedure, this paper Jilin Petrochemical Design and Research Institute for the study sample, detailing how to build a security framework for enterprise information network Design Institute of Jilin Petrochemical Information Network security architecture is an ongoing construction of the project, in the early development of the enterprise information, the lack of specialized personnel, planning guidance, Tong Shi lack of unified and effective planning, the project began before the company information network in a relatively messy situation. Based on the Jilin Petrochemical Design & Research Institute's analysis of the existing network conditions and order, concluded that the actual needs of enterprise network security and the urgent need to address the problem, and in accordance with theoretical knowledge, on the Jilin Petrochemical Design Research Institute's Network security architecture proposed renovation project.After the initial implementation of the program, Jilin Petrochemical Design & Research Institute of the network security framework has taken shape, although the project still in progress, but some of the data by comparing before and after transformation and network realities, we can draw the following conclusions: " Analysis of Small and Medium Enterprise Network Security Architecture, "in summing up the experience on the basis of theory to Jilin Petrochemical Design & Research Institute as a template to implement the enterprise information network security architecture design has been initially successful. Of course, also found in the implementation process of the design, there are still many gaps and shortcomings, but the results have been achieved can be shownThis paper discusses the network security architecture program is suitable for small and medium enterprises. With the successful application of this issue and further improve, will eventually conclude a building for small and medium enterprise development, the road information network security architecture...
Keywords/Search Tags:Small and medium enterprises, information network security, network security architecture
PDF Full Text Request
Related items