Font Size: a A A

The Research And Application Of Enterprise Network Security

Posted on:2017-01-26Degree:MasterType:Thesis
Country:ChinaCandidate:S Y LiuFull Text:PDF
GTID:2428330545962687Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the continuous development of the arrival of the era of big data and a variety of network applications,information technology as a secondary development of an important concept in the "five" in the proposed construction of information directly affects the ability of the business health development,and plays an important role in enterprise development decisions.A sound information network needs to have a good and effective network security system,must also be a network security system as the basis,otherwise it would be specious,the man.How to establish a set of enterprise network security system is the development of enterprise network administrator must study.As enterprise network security,should be considered from the following aspectsExport outside the network,at first,as the isolation enterprise network and public network barrier,firewall technology play an increasingly important role in enterprise security network construction,they can enter the network traffic to be,according to some predefined rules limit,for aggressive behavior has been found,can be effectively blocked,and can effectively protect the intranet through NAT conversion,agents,and other technologies.Secondly,as the external network entrance Ombudsman,intrusion detection and prevention systems,traffic can effectively be matched with the virus,thereby blocking the abnormal flow of information outside the corporate network,in addition it can effectively prevent SQL injection attacks,and bandwidth enterprise can manage a variety of applications.Where it is different from the firewall,the firewall is based on predefined rules to define what traffic is only allowed to enter into the corporate intranet into,and intrusion detection system is to restrict what traffic is allowed to enter into the corporate network into two by mutual coordination and interaction can do a very good interface to protect the corporate extranet.In addition,properly configured export routes is an important factor affecting network operationNetwork security,use vlan technology can effectively isolate the broadcast domain scope,but also allow administrators can more easily manage the network packets without vlan using different management strategiesData security,using VPN technology,you can create a temporary on a public network,dedicated virtual data channels,through the tunnel technology,identification technology,access control,digital authentication technology and encryption algorithms and other technical means to protect data during transmission the stability and security.IPSec VPN technology used in the VPN tunnel connection between businesses and branch offices.SSL VPN technology used in connection with staff while traveling within the enterprise network.In addition,as a business development vital corporate data,you should have a whole backup,storage and disaster recovery solutions.UPS allows network devices to continue to work after a power failure online data read and write operations have been completed,the completion of the storage operation.Raid the use of technology as well as the local hard drive also supports hot-swappable enterprise data protection to some extent.Centralized network storage technologies NAS and SAN data storage schemes may be established for different types of enterprise data,NAS file format suitable for unstructured data storage,and is suitable for data migration between different systems,we have better data sharing sex;SAN apply to structured storage,fiber link data blocks so that the transmission of data faster.Backup and disaster recovery aspects of the data,we can use the incremental backup,full backup,differential backup backup strategy combined with the three companies to develop their own characteristics data backup solution for their own businesses.You can use a good backup data offsite data disaster VPN link,so that the greatest degree of corporate data is protectedThe network security design scheme taking into account the characteristics of the Northeast Institute network structure,combined with various types of network protection technology institute for northeast of the old network has been re-planning and implementation.Program from planning,to organize,to implement the whole process thoughtful,efficient and orderly.Through the implementation of this design,the Northeast Institute security network has reached a high level of similar enterprises in the industry,for all types of network threats have been able to play a very good detection,identification,protection role.
Keywords/Search Tags:Network Security, Firewall, Intrusion Prevention, VLAN, VPN, Data Backup, Data Storage
PDF Full Text Request
Related items