Font Size: a A A

The Design Scheme Based On Internal Network Security

Posted on:2013-12-07Degree:MasterType:Thesis
Country:ChinaCandidate:W W HuaFull Text:PDF
GTID:2248330374460906Subject:Computer technology
Abstract/Summary:PDF Full Text Request
For government agencies and enterprises, due to the rapid popularity of network and the rapid increase of Information technology, web-based network application has become the essential part of the office and other business. These applications are based on the internal network of government agencies and enterprises, but there is a widespread misunderstanding of network security for those who work in government agencies and enterprises. Ignored from the internal network security threats, so the internal network is in an unsafe environment for a long time, and there is a worsening trend.This paper starts to introduce the basic concepts, status and characteristics of network security, also the root of the problem of network security to let us get a general understanding of network security.Then it introduces some concepts on the internal network, and describes the issued misunderstanding of internal network security, and analyzes its causes. Then it introduces the focus of this paper-the overall design and description of internal network security solution, the type of choice and security configuration on the network security equipment used in the program. It also mentions to build an internal network security system and strengthen security management of the internal network. Finally, it argues the concrete realization of the internal network security design in theory, and looks respond to security issues of the internal network in the cloud computing environment.The paper uses the progressive approach and from theory to practical design ideas. The proposed solution should have better adaptability and higher flexibility, and it can adapt well to the changes in government agencies and enterprises in specific conditions. This program has a good reference value and a wide range of practical significance for government agencies and enterprises to solve security issues of the internal network.
Keywords/Search Tags:Internal network, Invasion, Security, Inspection
PDF Full Text Request
Related items