Font Size: a A A

The Design And Implementation Of Enterprise Security Information Network

Posted on:2013-12-08Degree:MasterType:Thesis
Country:ChinaCandidate:L Y ZhangFull Text:PDF
GTID:2248330371484411Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In the thesis, combining with a construction example of classified E-governmentnetwork, the protection problem of classified network security is researched emphasis in thephysical isolation situation. On the basis of the full demand analysis of the network system,according to our country information security system and related laws and regulations, fromsome aspects such as physical security, network operation security, information security andsecurity management, the system characteristics which are vulnerability, risk and threat areanalyzed. For the analysis results, the security strategy is formulated. Using the newestnetwork security technology and other correlation network construction success experience,the system project is designed and some technology instruments are proposed which are thesystem management, the data backup and the protection, network anti-poison technology,identification technology, territory controller management pattern, security audit, thefirewall and the intrusion detection system linkage and so on. These technical method forma set of solution method, then it is operated.Computer network is the information age of the pillar, is also a modern enterpriseconstruction of the central nervous system, how in the future commercial competitionoccupy initiative, enterprise information network construction will play a vital role in.Development of enterprise of our country has always attached great importance to thedevelopment of enterprise information network construction, management networkconstruction as the key point to win business success. Therefore, we in the informationnetwork development and application is in the leading position. In addition, the UnitedStates, Japan and other capitalist powers are to strengthen the local enterprise networkdevelopment preparation and research. Data shows, at present there are150countries orregions of the enterprises have the perfect network competition ability. At the same time,each state of the local information network construction, based on the information networkdesign needs and range as well as technically possible, also with different morphology andsteps. Along with the information network expansion, popularization, development andimprovement, information network will become the main battlefield of enterpriseinformation competition.Generally, classified network has two protection keys, First prevents the externalintrusion using the physical isolation measure;Second is the network interior safe threat, Inview of internal network safety requirement, the author adopts the territory controllermanagement pattern, divides VLAN on the core switchboard, and designs the security auditprocedure. On the basis of using the traditional firewall and intrusion detection, the author designs a firewall and the network intrusion detection system linkage model, which realizesthe firewall dynamic rule establishment neatly and overcomes the flaw that the traditionalintrusion detection system is unable to realize the initiative control. The firewall andintrusion detection linkage system are realized successfully by the software code.The main security guard measures of the classified network security are researched indetail. Corresponding solution with the high performance-to-price ratio and the practicalvalue is determined.
Keywords/Search Tags:Physical Isolation, Network Security, Security Audit, Firewall, Intrusion DetectionSystem
PDF Full Text Request
Related items