Font Size: a A A

Network Terminal Information Leakage Prevention Security Strategy And Implementation

Posted on:2006-12-24Degree:MasterType:Thesis
Country:ChinaCandidate:C J WeiFull Text:PDF
GTID:2208360182460532Subject:Computer applications
Abstract/Summary:PDF Full Text Request
With the development of the compute technology, the Internet has been used widely in our daily lives. People enjoy the advantage of the Internet, whereas more and more problems in the net security have appeared. How to protect the users' confidential information has become the most sharpening and hot problem among these problems. This paper introduces physical isolation technique information encryption technique and file operation monitor technique. This paper brings forward a new security policy of defence in depth In addition, based on these analyses, this paper comes forward a design measure to avoid to data leaking in network terminal. This design measure is based on physical isolation. Discuss the realization principle of the data encryption and file operation monitor key techniques And this avoiding data leaking system in network terminal adopt many technology. Thus, this system guarantees the security of the information and data in network terminal.
Keywords/Search Tags:physical isolation encryption, file operation check and control, defence in depth
PDF Full Text Request
Related items