Font Size: a A A

The Security Domain Is Divided Critical Theory And Applications

Posted on:2009-11-12Degree:MasterType:Thesis
Country:ChinaCandidate:Z J ZhangFull Text:PDF
GTID:2208360245956017Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the economic development in high, and the requirement of operation increacing many times, the function of computer system is more stronging. The network is becoming complex. The demand is increasing between inter and exterior system exchanging , including in and out. The importante system and data face threaten of leakage and disaster. On the other hand, the data face the threaten of bug diffusing to lead network jamming, wrong operation to lead data to be mangle or the application system to be shut down. At present, it is the situation of network securate that the border of network is not clear, security requirement of network lack integrated plan, and it is out of control that user access information of cratal operation system. Clear control of Access information is lack between one access system and another. One network can visite another . This lead the part bug diffusion in the whole network. At the same time , Scale of compute system dilate with operation . Structure of network change quickly . Old securate structure of network is out of date and laggard . The level of threate of network securate is enhanced . Risk of securate is enlarged and surpass deadline . The plan of dynamic securate area pattition is put forward in article . The plan realize dynamic securate area pattition in a system . This enhance securate of network from the angle of deep and sufficiently think arrange of securate device and application . In detail progress :Firstly, author state background and concept of network securate and analyse situation of network securate in national and international . The author simplify dynamic securate model and introduce PFPE of dynamic securate area pattition on the limite of model. The formation of securate area pattition model sufficiently think about principle , aim and requirement .Secondly, by finding of border , topology of network is formed and arithmetic of topology of network is devised . Securate of device is set in the border and introduce OCTAVE to assess risk .At last, PFPE model is put into BOSS system of YMCC. Securate area pattition , finding of topology of network , setting securate device and estimate risk prove the plan is right and feasible .
Keywords/Search Tags:securate of network, securate area, topology of network, SNMP, OCTAVE
PDF Full Text Request
Related items