Font Size: a A A

Broadband Network Security Acting And Planning

Posted on:2012-01-08Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhaoFull Text:PDF
GTID:2218330338953022Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the popularization and development of Internet, computer network and people have been studying, working closely together, more and more computer users can enjoy without going through the network a wealth of information resources, and send and receive information quickly and easily. People enjoy the great convenience brought by the network, while network security is also being tested as never before, network security caused by data loss, system is damaged, stolen secrets and other issues also plagued the people. Therefore, to solve network security issues is imperative.In this paper, network information security is expanded description of the subject, especially for the lead characters of information security issues. Chapter 1 outlines a brief description of the computer network computer network development, network functions, network definition, network composition and the main purpose of the network. Chapter 2 an overview of network security. Chapter 3 to explore the characters a simple filter network information triggered by lax threats. Chapter 4 of network information security incident response. Chapter 5, ICP/IP the record management system for isolation, for my work related to the construction of the system in-depth analysis. This paper discusses the commonly used Internet security technologies and strategies, and network security technology trends.This paper uses a communication technology, systems engineering, network technology, ideas and methods of construction of Tianjin Unicom ICP/IP the record management system for separation of policy support and technical support are analyzed, the system design, construction, implementation, operation and Application of a preliminary study for the future government authorities to do the Internet the record, particularly the use of technical means to strengthen the supervision on the site the record provides an effective isolation of technical support.This paper describes the principles of record management system isolation, and from a technical point of view, isolated on the record management system of Tianjin Unicom system design and construction carried out analysis and research for government departments to provide the technical means to monitor the Internet. Isolation Distributed ICP record management system management information system by the ICP record filing system, IP filing system, the domain name record system, that system did not record sites, site investigation system, the site isolation systems, secure communications systems and terminal control system components and other components. For monitoring the situation of the access site to provide a powerful adjunct.Tianjin Unicom paper also ICP/IP address the record management system for isolated cases were summarized and analyzed, and the operation of the system and actual work requirements, discusses the system to be improved, in order to facilitate better use of the future Management system, give full play to the role of management systems...
Keywords/Search Tags:network security events, network security policy, security technology, evolution and planning, the record management system isolation
PDF Full Text Request
Related items