Research on Security Issues Based on Campus CAN LAN

Article Preview

Abstract:

With the rapid expansion of the rapid development of computer network technology and network coverage, campus network security issues are increasingly complex and outstanding looks up. In this paper, we have the analysis of the campus CAN security situation, put forward the principle of network security policy-making process to be followed, clearly a number of network security policy are also pointed out to build a more complete network security solution ideas. For the current campus CAN security issues, we discuss the principles and methods of the CAN network design process involved in the security system, and propose specific means for the campus CAN technology features. Meanwhile, we have researched and explored the characteristics and design of school network management, combined with the existence of the campus local area network insecurity, indicated security needs of the campus network, and to developed appropriate the security policy of campus network.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1884-1887

Citation:

Online since:

November 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Jakob Vlietstra. Dictionary of Acronyms and Technical Abbreviations. Springer, (2006).

Google Scholar

[2] Zhao P, Cao Xw, Luo P. Attack on Radius Authentication Protocol. Process of the ICCT 2003, IEEE, Vol. 1(2003), pp.208-212.

Google Scholar

[3] Willian Stallings. IPv6: The New Internet Protocol. IEEE Communications Magazine, 2004, Vol. 16(2004), No. 3, pp.114-118.

Google Scholar

[4] Testa Bridget Miatz. Zig Bec: Remote control euphoria. Telecommunications (Americas Edition), Vol. 38(2004), No. 10, pp.10-11.

Google Scholar

[5] Alok Tongaonkar, Sreenaath Vasu devan, and R. Sekar. Fast Packet Classification for Snort by Native Compilation of Rules. 22nd Large Installation System Administration Conference (LISA' 08). pp.159-164.

Google Scholar