Font Size: a A A

Design And Implementation Of Baosteel Terminal Security Management System

Posted on:2017-06-22Degree:MasterType:Thesis
Country:ChinaCandidate:J L SunFull Text:PDF
GTID:2348330488454683Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Along with the development of information technology, more and more staffs of Baosteel Co., Ltd use computer terminals for their daily office operations, which brings huge threat to the company information safety. According to the data published by the CSI/FBI, more than 80% of the security events happened in the intranet, most of which occurred in the intranet constituent unit, PC terminal. As a result, safety protection of the computer terminal is extremely urgent.No matter purchasing hardware equipment or the traditional terminal maintenance and statistics methods cannot satisfy the fast and convenient information security demand of the new age hi-tech company.This dissertation studies the terminal security management system of Baosteel Co., Ltd, named ecop. Based on the deep acquaintances of the company network terminal architecture, some creative studies and implementations about company terminal network security issues are accomplished. The main contents are as follows:The access control of user inserting terminal may permit legal terminals to access the internet and deny the illegal ones.The security test of legal terminals can allow the qualified ones to visit the internet while rejecting the others.The legal terminals may also get supervised. According to different demands, the managing policy also varies. If a terminal shows some actions that do not meet the requirement, it will be warned and even blocked-up.In a word, besides boundary protection, Baosteel Co., Ltd not only needs powerful safeguard to protect the boundary, it also needs effective protection of the intranet terminal. It should help the intranet terminal and the staff to strengthen the system safety, control the behavior of the users and enhance the computer security. Thus, it may improve the terminal environment of the intranet and consummate intranet information security system.
Keywords/Search Tags:network security, access control, e-cop, switch
PDF Full Text Request
Related items