- 1、本文档共55页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
电力企业信息安全策略研究与实现-软件工程专业论文
华中科技大学硕士学位论文
华
中
科
技
大
学
硕
士
学
位
论
文
II
II
Abstract
As the rapid development of information construction and with the application of information network technology growing popularity, information security has become an important issues affecting the security and the efficiency of the network. At present, the hardware environment of the information construction of the power system has been basically fulfilled. Whether the number of hardware devices or network construction are relatively in good condition. Production, marketing, dispatch and operation and other departments have also achieved informationization. However, cause the different divisions and sectors of the power system have big understanding gap about the information security, and different staffs need to raise awareness of the information security, as well as the shortage of understanding of new coming information security issues, while the lack of a unified information security management standards, etc. There are much more information security issues.
To solve these information security issues of the power enterprises, after introducing the basic concept and popular technologies of the information security, this paper studied risks and potential threats of the information security and analyzed the corresponding security requirements, based on a concrete power enterprise. According to the different using and functions of PC terminals and servers, we partitioned and isolated the enterprise’s network. Through the deployment of firewalls and IDS security devices, we modified the network structure, and designed and implemented corresponding strategy to enhance the network security, based on different levels of physical security, network security, system security, user security and data security. Besides, using VLAN classification, VLAN security technology, switch port security, user certification, BPDU filter technology, DHCP and ARP Snooping technology and devices security technology enhanced the informatio
您可能关注的文档
- 灯具包装的多功能设计-艺术设计专业论文.docx
- 灯光语言在城市夜景营造中的表达研究-城市规划与设计专业论文.docx
- 灯具设计在家居装饰中的情感体验研究-设计学专业论文.docx
- 灯泡贯流式水电站厂房三维静动力分析-水工结构工程专业论文.docx
- 灯泡贯流式水轮发电机定子温度场数值分析与测试方法研究-控制理论与控制工程专业论文.docx
- 灯头快速自动化装配技术研究-机械电子工程专业论文.docx
- 灯泡贯流式厂房动力分析-水工结构工程专业论文.docx
- 灯泡贯流式水电站水力过渡过程分析-水利水电工程专业论文.docx
- 灯盏乙素和灯盏花素对心脑缺血性疾病的保护作用-药理学专业论文.docx
- 灯盏生脉胶囊治疗缺血性中风恢复期的临床研究-中医内科学专业论文.docx
- 2024-2030年手机臂包行业市场现状供需分析及投资评估规划分析研究报告.docx
- 2024-2030年手机芯片行业市场发展分析与发展趋势及投资前景预测报告.docx
- 2024-2030年手机芯片市场前景分析及投资策略与风险管理研究报告.docx
- 2024-2030年手机芯片行业市场运行分析及竞争格局与投资价值研究报告.docx
- 2024-2030年手机行业发展分析及投资风险与发展前景预测研究报告.docx
- 2025黄金的抵押贷款合同.docx
- 2024-2030年手机行业风险投资发展分析及投资融资策略研究报告.docx
- 2024-2030年手机行业风险投资态势及投融资策略指引报告.docx
- 学习方法教育分享PPT模板.pptx
- 2024-2030年手机触摸屏行业市场发展分析及前景趋势与投资战略研究报告.docx
最近下载
- 互联网营销师初级题库多选题.docx VIP
- 2024年二级建造师继续教育题库及答案(500题).pdf VIP
- ACD奥的斯内部资料GECB及GDCB服务器使用.pdf
- 2024辽二建继续教育复习题库.pdf VIP
- 2023年海南大学计算机科学与技术专业《计算机系统结构》科目期末试卷A(有答案).docx VIP
- 柯林斯词典词频分级词汇(5星级).pdf
- 20240327-华福证券-电力设备与新能源行业低空经济深度报告系列(1):eVTOL,下一个出行风口.pdf
- 小学英语新人教精通版三年级上册Unit 6 Food教案(2024秋).pptx.doc
- 风机基础锚栓笼组件安装技术指导(1)(1).pdf
- 《Unit 6 Food》教学设计人教精通版(三起)(2024)小学英语三年级上册.docx VIP
文档评论(0)