Font Size: a A A

Zoomlion Network Access System And Desktop Security System Design And Development

Posted on:2013-04-14Degree:MasterType:Thesis
Country:ChinaCandidate:H YangFull Text:PDF
GTID:2268330401466883Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development and wide application of network technology, The faceof an increasingly complex and heterogeneous IT systems, the rapid development andwide application of network technology, scientific and effective coordination, terminalmanagement, endpoint security management is a complex issue, usually, anorganization in the terminal geographical dispersion, the user level variesarrhythmia, thebearer of the security needs of the business, which determines the complexity anddiversity of the terminal security building, according to the end-user access location,department, business needs and conditions, such as the selection and implementation ofappropriate security policies,neither engage across the board, and also allows users tolaissez-faire, and lack of control. In order to reduce the overall IT system costs, improvebusiness service levels, to maximize effectiveness. Create excellent flexibility to adaptto future changes in the information security business, to be placed in front of Zoomlionan urgent issue.With the accelerated the Zoomlion process the basic network and informationsystems, enhanced global role, followed by the network and information system flaws,vulnerability and the threats intensified, terminal security hasbecome the most importantissue in the security management, compared to passive defense hardware and softwaretechnologies such as firewalls, IDS, IPS, VPNs, terminal access control as a proactivenetwork security management technology, embodies the concept of active defense, caneffectivelyenhance the security of the network, has been more and more awareness andadoption of the financial industry. More and more enterprises have realized that networkaccess control system has become a basic framework of the enterprise, it providessupport for network access control security applications. Including authentication,security testing, security isolation, security notices, and security fixes, the dynamicauthorization important step.This is Of network access control technology, desktop security systems wereintroduced, summarized, summary and key technologies of the enterprise networkaccess systems and desktop security system synergy, discussed the principles of network access control system, contents and methodsto achieve the strategy, technology,and management of organic cooperative binding. on this basis, the proposed designmodel for network access control system, and implemented based on the WEB Adminauthentication Client and RADIUS services, network access system anddesktop securitysystem, collaborative module.
Keywords/Search Tags:Access control, Desktop security, Collaboration, RADIUS, 802.1X
PDF Full Text Request
Related items