Font Size: a A A

Research And Application Of E-government Network Security Architecture

Posted on:2008-09-07Degree:MasterType:Thesis
Country:ChinaCandidate:J ChenFull Text:PDF
GTID:2178360215495805Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of the computer technology and network technology, theapplication of E-government has witnessed rapid development, which has become a great issuein the global information technology industry. E-government, in the mean time, is experiencingsome setbacks brought by virus, hackers, and other malicious factors. Net safety has become anincreasingly serious issue. Lots of important information, including some top secrets of thenation, is involved in the nmning of E-government. Therefore, how to establish a safetyprotection system to insure a smooth running of E-government, as well as to fend thegovernment information off violations, has become a top priority for the system programmersand administrators.The thesis first touches upon the development situations of E-government, and thechallenges it is facing, followed by an analysis of several types of popular network securitytechnologies, such as Firewall, Intrusion Detection System, Virtual Private Network, VirtualLocal Area Network, encryption techniques, etc. Then the thesis analyzes the security defensesystem of E-government network in terms of security mechanism, fi'amework, design criteria,and architecture hierarchy. Again, by a case-study of Network System Security Project of oneGuangdong department, the thesis particularly analyses the network structure of itsE-government, potential problems of network security, then offers the requirement analysis andthe design scheme of network security for the actual complexion. The solution proposed in thethesis has utilized the mainstream network security technologies. The core firewall and the IDSprotection configuration strategies are discussed in detail. A summary and a prospect of thenetwork security system for the E-government are given.
Keywords/Search Tags:E-government, network security, firewall, Intrusion Detection System, Virtual Private Network
PDF Full Text Request
Related items