Font Size: a A A

Research On Design And Implementation Of The Security Schemes For Enterprise Network

Posted on:2015-08-02Degree:MasterType:Thesis
Country:ChinaCandidate:D WangFull Text:PDF
GTID:2308330452970328Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Recently, modern communication technology and computer networktechnology have entered a stage of rapid development and achieved significantresults, promoting the popularization of modern network. Network security is thebasic guarantee for the stable operation of the network. The value of networkapplications depends on network safe operation. The security of the data inenterprise networks, where a huge amount of information and data are stored, isespecially important. Thus, the scheme of the security in enterprise networks isstudied in this paper.This paper analyzes the network security risk of computer network in manyaspects, such as physical security risk, network security risk, system risk, virusprotection risk, artificial safety risk management. Moreover, taking an enterprisenetwork structure of a group company as an example, this paper analyzes thenetwork security situations, network security requirements and securitytechnology in-depth.Furthermore, based on the analysis of situations and security requirementsof information network security of the company mentioned, a system frameworkand an optimization scheme are designed according to the network securitytheory and technology. Firstly, adjust the original network security systemresources in the group company, and determine an information network securitytechnology framework of the parent company. Secondly, redivide the regionalsecurity according to the business needs of the parent company. Finally,designthe information network security system in detail, including redividing the safetyarea, adjusting the security boundary, configuring centralized authentication andaudit system, improving information network security management capacity ofthe parent company.
Keywords/Search Tags:Network security, risk analysis, security zone, Certification auditsystem
PDF Full Text Request
Related items