Analysis and Research of Financial Network Security Architecture

Article Preview

Abstract:

With the rapid development of network technology, computer network applications in the financial system is becoming increasingly popular, the financial network security issues become increasingly prominent. This paper through the analysis of various risks faced by current financial networks, proposes the design principles of financial network security architecture and the design goals of financial network security architecture, finally gives the design patterns of financial network security architecture.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 108-111)

Pages:

168-171

Citation:

Online since:

May 2010

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Wang Yi, Hu Han-ping, Wang Zu-xi, Chen Jiang-hang. Measurement model for network security based on traffic attack determination[J]. J . Huazhong Univ. of Sci. & Tech. (Natural Science Edition). 2008, 36(4): 37-40.

Google Scholar

[2] LV Hui-ying, CAO Yuan-da, SHI Cui-xia. Network Security Risk Analysis Based on Simulation Attacks[J]. Transactions of Beijing Institute of Technology, 2008, 28(4): 338-342.

Google Scholar

[3] XIANG Jun, QI De-yu, XU Ke-fu. Netware security model based on synthesized inter action mechanism[J]. Computer Engineering and Applications, 2008, 44(13): 117- 119.

Google Scholar

[4] CHEN Jia-qing, LIU Jun, ZHANG Da- fang. Survivability evaluation analysis for network secur ity management systems based on dataflow[J]. Computer Engineering and Applications, 2008, 44(2): 140- 143.

Google Scholar

[5] Zhang Yongzheng, Fang Binxing, Chi Yue, et al. Risk propagation model for assessing network information systems[J ] . Journal of Software , 2007, 18 (1) : 137-145.

Google Scholar

[6] QIU Xiao-li. Financial system Wide Area Network Security Policy[J]. FINANCIAL COMPUTER OF HUANAN. 2008, 4, 48-49.

Google Scholar

[7] ZHAI Jian-hong, ZHANG Yue, LIU Ya-wei. Research and Implementation of Security Management Technology in Classified Network[J]. Academic Research. 2008, 2: 70-72.

Google Scholar