Font Size: a A A

Control Of Network Security Technology, Based On Url Access Rights

Posted on:2008-04-12Degree:MasterType:Thesis
Country:ChinaCandidate:Z F MengFull Text:PDF
GTID:2208360242966441Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In recent years, internet technology matures, has already begun to provide and guarantee from the network connectivity to the major goals of the first generation of internet technology to provide a data network service for the second generation of internet technology transition. At the same time, tens of thousands of commercial companies, government agencies over the years of hesitation see that use internet technology and enterprise data communications networks into an extension of the internet has become a trend. This makes enterprise data from the network is quickly closed to the green, the network features for the second-generation internet technology shift to internet-based technology of the third generation of enterprise information network. All these have prompted the computer networking technology of rapid mass use. As we all know, as the scope of the largest global information network, opening internet protocol is very easy for all kinds of computer networking, broaden the sharing of resources. However, in the early design of the network protocol security issues ignored, and in the management and use of anarchy, the internet gradually serious threat to its own security, with its related security incidents happened frequently. The main threat to the security of networks in the performance: unauthorized access, posing as legitimate customers, damage data integrity, and jamming system uptime, using network-borne viruses, line tapping, and so on.The issue of network security information age has become common humanity of the challenges facing the security of the network is one of a very wide range of issues, which also involves whether a crime behavioral problems. In its most simple form, it is primarily concerned to ensure that staff can not read, not to change the transmission of information to other receivers. At this point, it is the object of concern to those who do not have the use, but tried to distance service people. Security also was intercepted with legitimate news and replay issues, and whether the sender has been sending news of the clause. The importance of network security with the demands brought about by the interconnection of internet security issues to be sufficient attention. This paper for the company's internal and external enterprise network design a viable safety programs for network security management provides a middleware. After a preliminary investigation and sampling survey, the company found that an enterprise network security from external and internal threats, establishing a comprehensive intrusion detection system and confidentiality, integrity, effective safety design goals. Technology used in the realization of Microsoft's IIS + C # + SQL Server. WebService Application makes the project is not limited to a particular server, and the realization of distributed applications, reducing the traditional issued only on a server in the server pressure. The system takes full account of LAN applications or Web site in the channel external attack Project generates a whole. Dll file, in other projects, in addition quoted as can be convenient and efficient security management. To reduce and avoid external malicious attacks to protect corporate data security for enterprises has brought enormous economic benefits.Based on the "domain - role - users" rules and the distribution of competence "minimum competence" and "mutual supervision" rules to reduce the scope of the involvement of confidential information, establish a relatively complete security control system and guarantee system.
Keywords/Search Tags:network security, security certification, authority control, WebService expansion
PDF Full Text Request
Related items