Font Size: a A A

Design And Implementation Of Network Security Strategy In Small And Medium Enterprises

Posted on:2019-08-14Degree:MasterType:Thesis
Country:ChinaCandidate:D R LiFull Text:PDF
GTID:2428330545970700Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Network information on computer has been into our common life in every aspects and become an indispensable part gradually.However,on the other side,there are also plenty of network security risks which can make a hostile attack on our system.Nowadays,network security has been a concern for us to develop it.In recent years,as a daily tool in the network security protection,firewall has been known and used widely as a technical means by the public to solve a lot of usual network security problems we encountered.This paper make an analysis about the design of enterprises' network security system based on firewall.First,it introduces the background of this paper briefly and makes an analysis of the advantages and disadvantages of firewall technology.Second,it concludes the current situation of domestic and foreign firewall technology,including the definition,connotation,technical means,function principles and developing trends with according analysis and evaluation,Third,in this paper,it discusses three switches and new firewall security strategy in details.Based on the new firewall technology,it designs a new safety structure by considering user's actual needs,the client's software functions are designed to allow users to realize the real-time monitoring and controlling of the entire enterprise network,main functions of the client include the setting function of system intercepts,the LAN(local area network)supervisory function and the blacklist management function.Finally,after the system design is completed,the security of the system is tested by setting up the simulation platform oriented in qualitative and quantitative tests to ensure that the system with the final security policy can be used normally under the premise of ensuring the performance.
Keywords/Search Tags:Network information security, Firewall technology, Security policy
PDF Full Text Request
Related items