Enterprise Computer Network Security System Design & Realization

Article Preview

Abstract:

The idea and method of multi hiberarchy design for security is proposed in this paper with the basic theory of security for modern network. A detailed analysis on hiberarchy is done to figure out the potential security risk under various internal levels of an enterprise by deeply study on a dummy enterprise network. According to the principle of integrity, balance, combination of technology and management, a network security target which is fit for the requirement of enterprise is issued. And based on it, a total network security solution is proposed. This article focuses on the setup of firewall, design and setup of inbreak detection system, implementation of VPN and application of access control program. It also discusses the selection, setup and management system of the network hardware. This solution has a lot of advantages, such as high practicability, strong security, good performance-to-price ratio, easily exercisable, advanced setup and well extensibility.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3195-3198

Citation:

Online since:

March 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Bensonnior, A.R.; A Bonneville Power Administration Delphi0 Project for Power System Operation and Control, 1983, 987-999.

DOI: 10.1109/tpas.1983.318197

Google Scholar

[2] Danielson, S.; Kadlowec, J.; Mehta, S.; Masters, C.; Magill, M.; Steadman, S.; Work in Progress - A Statics Skills Inventory, 2005, 234-245.

DOI: 10.1109/fie.2005.1611926

Google Scholar

[3] Huang, L. -C.; Chang, P. -T.; Lin, H. -J.; A study of fuzzy assessment model for managerial talent, 1996, 666-689.

Google Scholar

[4] Osten, H.I.; Lasance, C.J.M.; Parry, J.D.; The world of thermal characterization according to DELPHI-Part I: Background to DELPHI, 1996, 890-899.

Google Scholar

[5] Quinton, S.; Lucock, R.; Cerrito, L.; Charentier, P.; Johansson, K.E.; Lanceri, L.; An overview of the first and second level trigger of DELPHI, 1989, 345-356.

DOI: 10.1109/23.34470

Google Scholar