Font Size: a A A

Design And Implementation Of Security Of Campus Card Network Boundary

Posted on:2014-11-04Degree:MasterType:Thesis
Country:ChinaCandidate:F H ZhuFull Text:PDF
GTID:2268330425984209Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of China’s campus informatization and digitization construction, the full integration of the campus all kinds of information resources has been transferred by the planning process implementation phase. Campus card is an important part of campus informatization and digitization construction, with comprehensive consumption, identity recognition, financial services, public information services and other functions, and are mutually connected the banking system, the campus network system, overall throughout the school teaching, research and service life, shows its powerful service function. The campus one-card-through system is basic project of the campus information. In order to ensure the safety of engineering data, the campus card data transmission using a closed network. But due to the expansion of the campus card use function and demand, must carry on the exchange with other network data, therefore it is necessity to produce the network security problem on the boundary.Based on the campus card network border security problem as the research point, analyzes the existing campus card network border security issues, on the feasibility of the campus card network security solutions, the main work is as follows:1) technical problems and combining the characteristics of financial network and campus network, bank network, integrated network of three network boundary docking system the network security, the layered design rules, according to the different data and application requirements, the card network data are divided into different security levels;2) the topological structure of the network card system is given, the important concept of Intranet, extranet, IC card terminal equipment sub-network, silver school transfer network;3) combined with hierarchical design principle and network topology design, the security isolation and information exchange technology, access control technology, terminal physical isolation technology, data access logic isolation technology, has realized the network security related settings. Through the show in smart card application of Wuhan University, using these settings can greatly improve the effectiveness of the campus card network border security.
Keywords/Search Tags:campus card, network security, border security, network configuration
PDF Full Text Request
Related items