Font Size: a A A

The Design And Implementation Of Network Security Schema For An Organization

Posted on:2014-06-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y ShiFull Text:PDF
GTID:2268330425995330Subject:Computer technology
Abstract/Summary:PDF Full Text Request
It is a natural trend for all kinds of enterprises and public institution to strengthen their informatization construction along with the fast developments of social economy, social culture and computer network technology. Informatization greatly enhance managing ability on difference process of daily work, thus provide a huge space for the enterprises and institutions to optimize its management and production structure. With widely spread of informatization construction, it will be natural to combine original business system and information technology more closely than ever, and to require a safer and more reliable information system than ever. However, with the spread of information application, information security thread happens at the same time. This paper studies the design and implementation of A network security solution for the Association, aiming at the problems occurred in the Association’ original network operation, specifically as follows:First of all, based on the current situation of the association network security and the concrete problem, it analyzes present situation on the Association’s network security, introduces the key technologies in the field of information security as the IPS intrusion preventing technology, integrated security gateway, security audit, log analysis technology and application system redundancy and disaster backup and recovery technology.Secondly, it schemes a network security model covering three security domains, and designs concrete module subsystem structure covering security protection, flow management and backup-upgrade module and etc, implementation project and corresponding strategy and rules based on the model, which comprehensively supervises the association’s whole network in accordance with network manage regulation, with assistance of VLAN strategy and IP managing strategy. It specifically describes the design idea, system structure, function dividing, module establishment and relevant equipment and presents the implementation chart and detail implementation plan.Finally, that every content described in previous chapter is tested and verified through living examples after its implementation. It is not only verified that some module and subsystem work well, but that the project is effective when dealing with network attack and abnormal network. It is concluded that the project has achieved the design requirement.Now the network security project designed in this paper has achieved its expected design target. It effectively improves the association’s ability to defend various network attack, and reduces the risk of confusing or even completely down for the internal information system caused by virus or Trojans attack. It has a good reference to those enterprises and institutions that have the similar network scale or working mechanism, when they implement the similar informatization security construction.
Keywords/Search Tags:Network Security Schema, Backup-Upgrade Module, Log Analysis
PDF Full Text Request
Related items