Font Size: a A A

Design And Implement Of Network Security Protect System For Enterpirse Office

Posted on:2016-01-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y ShenFull Text:PDF
GTID:2308330482473232Subject:The Application of Computer Technology in Communication
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology and network technology, modern office has developed rapidly in the direction of office information. By the use of modern computer and network technology which is based on office automation, office information enables organizations such as governments, enterprises, schools, armies and so on to transfer the traditional office functions to the network in order to make the corresponding expansion of information,and further more to realize a paperless office and improve office efficiency. However, with the development of office information, network security is becoming more and more important and the build of information security system of enterprise office network has become an urgent task.The paper researches and analyses the current network security technology and data backup program, and made an on-the-spot investigation on the present situation in the case of enterprise office network. It also puts forward a demand analysis and design of upgrading enterprise office network to solve the security problems such as system damage, service paralyzing, the steal of important documents, virus spreading etc. in the application of enterprise office network. Through design of the redundant network topology structure, application of virtualprivate network, firewall security rategic planning and other aspects of a series of measures, in order to achieve the networkbehavior management, document security, virus protection, data backup and other functions of network security system construction, there has been able to meet therequirment for network application secrity of enterprise office.This proposed network security precautions in this article, are playing security safety roles correspondingly in reality, and best practices in information security technology, it is also effectively protecting network security running and information security.
Keywords/Search Tags:Network Security Management, Information Security, Virtual Local Area Network, Firewall, Dual Computer Hot Backup
PDF Full Text Request
Related items