Font Size: a A A

Research On Campus Network Security In Zhuhai Area Of Bejing Normal University

Posted on:2012-11-16Degree:MasterType:Thesis
Country:ChinaCandidate:J TangFull Text:PDF
GTID:2218330371952153Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years, as the rapid development of Internet technology , a new roundinformation construction was raised upsurge in universities .As the operation platform ofapplications, the campus network is obtained fast development. Now most of the teaching,office, management,and life service, all of the services cannot leave the campus network.People depend more and more strong on the network.However, with the constant expansion of campus network,the deference of the Internetform and diversification of equIPment, The problem of network security became Increasinglyprominent, and a series of the network security question that closely related to it. So thecampus network not only faced from Internet security threat, also faced the intentional orunintentional security threats from the various users. Therefore,it has become all the top issuesecurity technology facing the university that how to ensure a stable and efficient andsafe campus network operation .This paper base the campus network of Beijing normal university, zhuhai and itscharacteristics ,according to research of security issues of campus network from the homeand abroad, it more deeply researched Internet security threat and protection measures, andthe technology ofcampus network security .It explains P2DR dynamic security model.Furthermore,it applied this model as the theory basis , and detailed discusses all kinds of riskfacing of campus network ,and the relations of them, and the safety requirements andsolutions.And then, according to this relations ,It gives a whole solution of campus networksecurity.Practice proves this scheme can meet the security needs of a campus network, canfurther improve the campus network security protection and network management level.
Keywords/Search Tags:Campus Network, PPDR Model, Integrated, Security
PDF Full Text Request
Related items