Font Size: a A A

Sichuan Mobile Service Network Security Strategy And Implementation

Posted on:2008-05-21Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhangFull Text:PDF
GTID:2208360245962061Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of computer information technology and network technology, computer and network, have become an important information carrier and transmission channels for the enterprises. Aside from the conveniences brought along, potential safety problems appear now and then, which is particularly true when enterprises suffer occasionally from leakage of important information to enterprises. Therefore, it is of great significance to take preventive measures targeting at internal network information security risks.By analyzing the current network security technology advantages and disadvantages, the author designs a call center network security system according to the status quo and needs of call center network security, design a call center network security system. Functionally, call center network system falls into two types: production network, the prioritized protection target; office automation (OA) network, emphasizing network border security. Corresponding security measures are taken through setting external interfaces of 2 sub-networks, in accordance with the controllability of exports, risk levels.Virtual local area network (VLAN) technology is employed, and VLAN division rule is set down, logic division is done on production network; According to different case, corresponding fire wall technologic is adopted, and what's more, fire wall is set on external interfaces and internal networks. Security assessments are carried through on important network equipments, resource, and security equipments. According to the type of network to be protected, boundary protection system adopted and different protection rank, the mode of entering into detection system is ranked either. What's more, according to design theory and methods of network invading adopt several mature invading detection system technology, reference to a large quantity of source code of invading detection system in business rank, develop language with PERL, in the system of Linux from Agriculture Bank, with background of RedHat, a network invading detection system is designed and implemented.This program, whose basic principles and methods are based on practical work, has some practical significance for the structural adjustment of call center customer service system and designing of network security.
Keywords/Search Tags:Network security, Call centers, Computer public risk / vulnerability, Network intrusion detection system, Linux
PDF Full Text Request
Related items