Font Size: a A A

The Design And Implementation Of Shandong Haihua Group Network Information Security System

Posted on:2014-11-20Degree:MasterType:Thesis
Country:ChinaCandidate:M G WeiFull Text:PDF
GTID:2268330425468228Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of computer network technology, the Internet applicationsbecome more widespread, has penetrated to work, live, study all its aspects. Largeenterprise networks significantly enhance the level of information, by means of acomputer network system to reduce production costs, improve product quality,enhanced enterprise efficiency.However, the computer network system in promoting social progress and promoteenterprise development, improve labor productivity, while its openness also makes itvulnerable targets, sometimes causing huge economic losses, so the networkinformation security problems to be solved. To effectively solve the Shandong HaihuaGroup network information security risks faced, the paper made the following tasks:(1) Analysis of the modern enterprise computer network system as well as thestructure and application mode of modern enterprise network information securitysystem faces major risks.(2) Shandong Haihua Group discusses network security system design goals andprinciples. Through the network level security domain rational division of attackdefense in depth; using data encryption, digital signatures, authentication access controltechnology and other measures to ensure the security of network data; using firewalls,intrusion detection, data backup, database security strategies to solve application layersecurity needs.(3) Through the Shandong Haihua Group network information security riskanalysis and safety requirements analysis, design and implementation of ShandongHaihua network intrusion detection system, and the system of six sub-modules in detailthe design and implementation on this basis from four aspects of the system were testedand analyzed.Finally, a brief summary of the main thesis work, and the next step proposedvision.
Keywords/Search Tags:Information Security, Encryption technologies, Application Mode, IntrusionDetection
PDF Full Text Request
Related items