The Brief Analysis of Solutions to Automated Network Equipment Security Configuration Baseline Verification

Article Preview

Abstract:

This paper introduces definition, control object and classification of network equipment security configuration baseline, analyses the difficulties of security work of the security configuration baseline, discusses function demand, the system architecture and the deployment module of the security configuration baseline verification , forms basic shape of the solutions to the security configuration baseline verification and gives suggestions to improve the security configuration baseline indemnification.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2360-2365

Citation:

Online since:

January 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Yang Qingming: The Application of Information Security Baseline Management in Enterprise Informationization, Oct, (2013).

Google Scholar

[2] Gui Yonghong: Study and Applications of Operation System Security Baseline, Oct, (2011).

Google Scholar

[3] He Binying: Security Baseline for Network Equipment Configuration, Sep, (2012).

Google Scholar

[4] Liu Kai: Network Equipment Configuration&Management Technology, (2010).

Google Scholar

[5] Dong Mingli: Network Equipment Configuration and Example of the Three Non-Essential, (2012).

Google Scholar

[6] Gao Fei, Li Honghui, Dai Gang: Design and Implement Configuration Software of Network Device Based onTelnet.

Google Scholar