Font Size: a A A

Design And Implementation Of Information Security Schema For An Network

Posted on:2018-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:H Y ZhouFull Text:PDF
GTID:2348330515951571Subject:Engineering
Abstract/Summary:PDF Full Text Request
Swift development of computer and networking technology accelerates the steps of global informatization.Global informatization has become mega-trend of social development.Network information system carrying much information is the base installation of realizing informatization.Because network information system is faced with various threaten,such as virus,intrusion,man-made damage,a lot of security problems come into being.These problems about network information security are mainly caused by some hidden troubles,such as faults of network protocol,faults of nework hardware,faults of operating system,faults of utility software and bad behaviors of computer.In order to insure network information system secure,building the information security system for network has become important.XX company is a part company of state-owned enterprise,the network information system of the company has a certain size,however,the defence ability of network information system is very weak.In order to improve security of the network information system and guarantee normal operations of every businesses of the company,the company decides to plan and construct the security system for enterprise network.Firstly,the thesis realizes the security requirements and the current situation of the user's information system,by investigation aim at the current network situation and the security requirements.Analyse the requirements in-depth combining six nature theory about network information security.Aim at the result of analysis,draw up the security mechanism of the information security schema for the network.Point out the related techniques in the schema,including: information encryption,firewall,IDS,unified security management,anti-virus,computer management and control,identity checking,network security audit,by analysis of the security mechanism and related techniques.Secondly,draw up the security architecture on the basis of the security mechanism.Design the information security schema for the company network by researching the security architecture in-depth with the related techniques.Select the type of equipments in the schema.After that,describe the realization of the part system and expound the features of the unity system on the basis of the information security schema for the company network.Finally,testify that the information security schema for the company network have ability to defend attack by testing the important technical index of the schema.The result of the test indicates that the system fulfils the security requirements of the company.The information security schema for the company network has achieved its expected design target.It effectively improves the company's ability to defend attack,reduces the risk of virus infection for the internal network information system,and makes limits of authority standard for all computers.The schema has a definite guidance function to enterprise network security constructions.
Keywords/Search Tags:Information security, Security requirement, Anti-virus, IDS, Security policy
PDF Full Text Request
Related items