- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
公司信息网络平台安全护系统的设计
毕 业 设 计(论文)
题 目:公司信息网络平台安全
防护系统的设计
学 院: 计算机学院
专业名称:计算机科学与技术
学 号: 200820410120 学生姓名: 冯海峰
指导教师: 李 芳
2010 年 04 月 21 日摘 要
随着计算机网络的发展,三层交换技术已经普及,网络系统已经步入成熟期。计算机网络的广泛应用已经对经济、文化、教育、科技的发展产生了重要影响,许多重要的信息、资源都与网络相关。但是日益严重的网络安全问题也开始凸显出来。
关键词:交换技术;网络管理;网络安全;安全防护
Abstract
Along with the ComPuter network fastd evelops,three-layers-switchtechnology has already popularized.And network system has marehed into the matureperiod.The widespread applieation of computer network has already had material effect to the development of economy,culture,education and teehnology.Many important resourees and information are interrelated to network.But the serious network secunty problem also starts to highlight day by day.
The scale of computer information system (CIS) expanding and the security technologydeveloping, a systematic and normalized computer information system security architecture (CISSA) is needed to strengthen the design, development, implementation, evaluation and management of CISSA. In order to nonmalize the build of CISSA, and construct the securitydefense architecture in our country, a uniform CISSA model and the implementary standard mustbe built.
Aim at the disadvantages of the popular CISSA models and implementary standards, wefocus our work and research on the key technology of the layered, graded and dynamic defenseand the cooperative communication platform. The following contents are discussed in this thesis.
(1)Basedonthe study of popular security architecture models, a Defense- in- D- ynamic Depth CISSA model is presented to guide the build of CISSA.
(2)Based on the study and analysis of many security architecture standards, the SecurityRegion and the Defense Layer are introduced, the Information Category, the Threatening Level and the Security Protection Level (SPL) are put forward, the methods and requires of the Security Analysis are discussed in this paper.
(3)Based on the security architectu
您可能关注的文档
最近下载
- 成都第四十九中学新初一分班英语试卷.doc VIP
- 中经金融高频考点.doc VIP
- 竞聘演讲稿经营管理部部长.pptx
- 学堂在线 中医养生方法学 章节测试答案.docx VIP
- 整村授信专题培训ppt课件.pptx
- 2025年科技强国爱国主题班会《科技强国 强国有我》课件.pptx VIP
- 《常州武进常州燊荣金属科技有限公司“1·20”较大粉尘爆炸事故调查报告》警示教育专题培训.pptx VIP
- 智能化弱电工程投标文件的技术部分标书范本.docx VIP
- 行业分类专题研究:行业分类标准2.0版及修订说明-20200102-中信证券.pdf VIP
- 深圳市翰林学校英语新初一分班试卷.doc VIP
文档评论(0)