Font Size: a A A

Design And Implementation Of Computer Network Security System Of An Information Technology Enterprise

Posted on:2016-06-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y T ZhaoFull Text:PDF
GTID:2308330482465343Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the development of network technology and network application, the computer in the network constantly changes people’s way of life, study and work. We can say that people have been unable to work and study without the computer. As computer network is so important in our daily life, how to guarantee safe, reliable, and stable operation of the network has become an important network design and management issue of common concern. Enterprise as one of the active network user, its internet application in the enterprise network are under the condition of increasing scale and network applications. Enterprise network security problem is more and more prominent. Enterprise network’s business planning, development strategy, production arrangement, the safety and stability are all directly related to enterprise’s normal production, operation management, and business development aspects of confidentiality. Therefore, it is very important for enterprises to build a secure network system.At first, this thesis introduces the enterprise network security requirements in detail. Based on these analyses, it puts forward the design principle of enterprise network solutions and the basic idea about the network security design. The demand of the enterprise network security is mainly to carry on the effective protection for the network and equipment, ensure the security of data transmission, and save the efficacy and safety. The effective management of the network traffic, such as online game and chat, should obey the design principles to follow a comprehensive, integrity, balance, availability, and step by step implementation as well as the principle of dynamic management and so on. In turn, this work studies the design and implement of the corporate network security, based on the demand analysis and design analysis. The comprehensive network security design scheme has been given from six aspects. The first module is designed for remote access security, the second is designed for border security, the third module is about the network security, the fourth aspect is about the data center security, the fifth is about the internet behavior regulation, and the last one is the unified security management design.For the enterprise network, whether intentional attack or the operation of the internal fault, it will cause great damage to the network data. An attacker can eavesdrop on the network information, and steal the user’s password and database information. They can also tamper with the database content, forge the user identity, and deny their signature. Furthermore, the attacker can delete the database contents, destroy the network node, and release a computer virus and so on. But for the enterprise, external attacks are relatively few, the attacks from the inside staff appear more often. They know the secrets of the company and daily mistakes will bring security risks. All of these make the information security problem more and more complicated. The main purpose of this article is trying to solve these problems in order to promote enterprise network security with practical examples.
Keywords/Search Tags:Enterprise network, Security design, External attacks, Border security
PDF Full Text Request
Related items