Font Size: a A A

A Certain Institute The Design And Implementation Of Network Reconstruction And Security Operations

Posted on:2013-01-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y SunFull Text:PDF
GTID:2248330374485630Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Computer network system has become the research and production of XX indispensable basic platform, the system capacity, reliability and management capabilities of the network have not qualified for the needs of current and the next stage of research and production, while the security performance of the network cannot meet the needs. This article talk about the XX network security needs, design a XX network system security scheme, and the design can realize the corresponding network management software system, realize the network maintenance and safety performance.In the project, the demands for network security is analyzed in detail, according to the scheme of reconstructing network design principles and network safety requirements for equipment, physical security, safety, information security analysis. The hardware transformation design the security scheme, against illegal access control, computer network virus, application access control system, system vulnerability scanning database security audit, access control, file transfer, border control.The main project includes the research background and the significance of the research are analyzed in detail, and the XX network present situation and the existence question to undertake one by one is described, and the main work of this thesis and the structure are described; part two defines the article on the network security management and concepts undertook thorough analysis; part three analysis the article on XX network platform of needs, proposed the network platform and the necessity of reform, and the network platform to transform the functional requirements and non-functional requirements to undertake one by one analysis, also given the overall framework of the system; part four carried out analysis and design of the solution on XX network; part five of the article is to the network in the process of transforming the network operation and maintenance management software design are described in detail; part six tested and implemented the XX network security system with detailed design; part seven for conclusion and future desired effect.
Keywords/Search Tags:Network security, Network upgrade, Network operation andmaintenance management, Information security
PDF Full Text Request
Related items