Font Size: a A A

Study On The Method Of Internal Network Data Transmission Security

Posted on:2016-11-16Degree:MasterType:Thesis
Country:ChinaCandidate:M ZengFull Text:PDF
GTID:2348330473965898Subject:Software engineering
Abstract/Summary:PDF Full Text Request
At the beginning of 2014, the strategic goal of general secretary Xi Jinping clearly put forward the building of network power at the first meeting of the central leading group on the network security and information, which contains the ardent expectations of the internal network security.Due to the rapid development of computer network and information technology,the network plays in the government and enterprises and institutions in the more and more important role, the business is increasingly dependent on information technology, and most of them are in the construction of the internal network. For enterprises and institutions of workers still have some misunderstandings in the aspects of network security, the network security threats facing the understanding is not deep, so that the internal network security situation is more serious.There are many on the network security research, methods varied, but the biggest deficiencies of existing studies mainly the following aspects:The research field of relative isolation. Either for the technical field, or for the field of legal management system. Research level is a single level. Often involves only information leakage, intrusion detection system, firewall and so on a certain level of research. Method of research is singleness. Either method of technology,either for the method of legal system. The object of study is mostly static. The results of the study are often not used in the new situation, the new environment changing.There is no uniform model in solution. At present, all studies were not involved criterion, the internal connection, can be replicated, scalable, prevention method and the unified theory of the unity of the intranet security.To solve the above problem, this paper will be through the way of modeling from the multidimensional and dynamic angle to give a unified internal network data transmission security specification, standard processing method, which has universal significance to solve.The main work and achievements of outstanding performance in the following 3aspects:1. The first study to matrix theory and internal network data transmission security methods were combined, after the study proposed a new security methods.Through the application of matrix theory, the network security risk prevention rules tofollow, there are rules to follow, safety management and control has become a "formula", explore the new perspective to the study of the problem, network security risk prevention.2. The establishment of the model of network security risk prevention and unified, the environment, multi network, multi application, multi terminal and risk prevention of a variety of complex conditions to achieve unified management.Network security risk prevention model has strong expansibility, applicability and flexibility, has laid a solid foundation for the further research of deeper.3. The factor of safety guard technology module, the security becomes easy and fast, once the risk occurs, the first time to be resolved. Research and design a set of complete and effective risk assessment method, and has won good use at work.
Keywords/Search Tags:Internal network, Factor of safety, Block solution, Model of network security, Matrix, Risk assessment method
PDF Full Text Request
Related items