Font Size: a A A

Information Security Within The Enterprise Campus Network Applications

Posted on:2008-08-16Degree:MasterType:Thesis
Country:ChinaCandidate:H Y ZhangFull Text:PDF
GTID:2208360242958345Subject:Computer applications
Abstract/Summary:PDF Full Text Request
In view of how to construct the regional network security of enterprise, multiphase works are carried out, some methods and technologies which applicable for safeguard of enterprise network are optimized.Based on the reality situation of Internet and Intranet application, various of safety complication such as man-made reason, network virus, hacker attack and system error are clearly elaborated, meanwhile, the target of characteristic of information security are also dissected, some measures for hazard the security of network are analyzed as follow; Based on a example of reality regional network, the overall construction process is detailedly introduced from the initial plan, safety complication, gradually perfect and development to finally taking measures for enterprise regional network. Through the example of prototype significance, various of security techniques of network related to construction process of enterprise regional network such as VLAN, fire wall proxy server, ACL, detecting invasion, preventing virus and safety assessment are introduced. In light of the biggest question of computer virus threatened the network information security, the generalization of computer virus and developing process for prevention in enterprise network are introduced in full, how to build the "protection system for virus in all direction" in enterprise network and the developing trend of protecting computer virus are probed by using the reality cases. Finally, the Trojan horse virus that there is tremendous destructive power for computer is introduced, based on a real Trojan horse virus is eliminated by using reality case, the general proposal method is summarized. A set detailed countermeasure for how to guard against the computer Trojan horse virus and safeguard the information security is proposed.The goal for the article is to study and discusses with the readers as for each kind of measure of threat network information security, guarding by the principle of "acts appropriately to the situation, prevention primarily", a relative security for enterprise regional computer network will be constructed and enable the network technology to guarantee for enterprise's development.
Keywords/Search Tags:information, security, virus, Trojan Horse, Attack
PDF Full Text Request
Related items