Font Size: a A A

GPRS Business System Security Zone Is Divided

Posted on:2013-12-29Degree:MasterType:Thesis
Country:ChinaCandidate:X YaoFull Text:PDF
GTID:2248330374970339Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
In recent years, with the rapid development of telecom services, IT level gradually improve the architecture of traditional telecommunications equipment operation and support system, but also the ensuing earth-shaking changes, before a single telecommunications equipment, the integration of morebased on IP/IT platform to build business systems, business systems, the importance of self-evident. Business systems, however, mostly in the early construction, did not consider a uniform security policy, zoning and protection, and due to its own protocol, architecture, technology gaps, leading to personal information leakage, recharge card stolen security incidents that frequently appear in security issues are very prominent. Protection of business systems security, stability and smooth running of telecommunications information security a top priority, the relevant laws and regulations to meet the requirements to maintain their competitive advantage, an important guarantee of the development strategy and support.In this paper, the Security Zone division of the Telecommunications operations system and boundary integration preliminary study, and describes the challenges faced in the design, implementation. Meanwhile, based on years of research and accumulated experience, given the Security Zone design, implementation methods and requirements.I in engineering practice, the General Packet Radio Service technology (General Packet Radio Service, referred to as:GPRS) system, the division of design of the security zone, given the security policy adjustment programs. Article first GPRS system, the network structure and function of a brief introduction, followed by the current network structure of an operator GPRS system research, and business-critical data streams are described, and then based on the above findings, combined with grade protection requirements and operators corresponding standardized GPRS system of the existing network security zone is divided into design, and finally given the appropriate protective strategies and boundary integration solutions.The security zone is divided into a complex system works, the whole process to consider the safety life cycle of all. Along with the entire security life cycle process, the security zone should be gradual, step by step process, the security zone is divided into, it should be with the establishment of the security policy and accompanying software and hardware development, the formation of a complete security system ideas, and not solely to the construction of the security domain, but ignored the entire security system.
Keywords/Search Tags:Security Zone, business systems, data flow-driven, General PacketRadio Service (GPRS)
PDF Full Text Request
Related items