Font Size: a A A

A Secret Within The Enterprise Network Security Management Strategy

Posted on:2011-08-29Degree:MasterType:Thesis
Country:ChinaCandidate:B XiangFull Text:PDF
GTID:2208360308466199Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the enterprise informationization construction acceleration, the new security threat and the complexity of network management also continue to increase. In this circumstance, firewall, IDS and other network security products have been deployed in enterprises, border security is assured. However,according to statistics about 80% security threat comes from intarnet,especially from local desktops.Due to shortage of precaution sense and enhanced intelligent of network crime,staff's desktops have already been a bottleneck of network security, weakness point of guarding against network attack. The attack and staff's online behaviors deliberately or not bring an unparalleled threat to information's storage,transmission and access control.Therefore intranet security management policies should be emphasized, so that such challenges, together with their undesired consequences can be avoided. In order to protect the enterprise intranet security, network admission control, intranet behavior standardizing,desktop consolidation, and the sensitivity of the information revelation preventing need to be enforced.In the light of the security demand analysis of the enterprise intranet, to standardize the intranet online behaviors,the C/S and B/S architecture network behavior supervision systems were proposed,and the designing and compositions of these two systems were introduced. On the ground of the deployment of these two monitoring systems, centralized security management strategy is proposed in this thesis; this strategy helps the enterprise's intranet implementation and management.This strategy emphasizes on network admission controlling,desktop consolidation,behaviors monitoring and audit,as well as intranet resources and staff's online behaviors centrally-managing. Suitable security protection tools from the available tools are chosen and deployed,they are an addition to the existing system. Therefor, the network security system is more effective when facing new security challenges. Centralized security management strategy emphasize on the staff's online behaviors. First of all, network accession control is enforced, secondly online behaviors is real-time monitored and audited,finally the desktop is positioned and handled when the staff's illegal operations occur.The tests prove that those two prototype systems have been applied to network security monitoring successfully. The privilege for accessing confidential device and information, the information storage and transmitting are guaranteed. At the same time,the workload of network security management staff is lowered and regulatory compliance of this enterprise is maintained.
Keywords/Search Tags:enterprise intranet security, network behavior monitoring system, the sensitivity of the information revelation preventing, centralized security management platform
PDF Full Text Request
Related items