Font Size: a A A

Problems And Solutions To Information Security In Small And Mid-scale Enterprises

Posted on:2008-12-13Degree:MasterType:Thesis
Country:ChinaCandidate:S LinFull Text:PDF
GTID:2178360242471528Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Nowadays, information is one of the most important national resources. The information and the network utilization is also perceived as a symbol of a nation's power in 21th century. Taking the network as the carrier and resources as the core, the new economy has converted the traditional model of capital employment. As bussiness resource, information calls for safe guarding.To begin with, the thesis explores the concept and the current situation of information security. At present, small and mid-scale enterprises suffer from lack of manpower and money. The network security products require not only simple installation, but also an all-in-one solution aiming at the complex network operation. The solution runs on the principles of real-time monitoring, easy management, provided safe strategies, and security system perfected by users.The second chapter elaborates the network security program founded on the technology of Firewall. This program enjoys such qualities as simple construction, convenient management and maintenance, small investment. However, owing to the limitations of Firewall functions, the performance of the program is also restricted.The third chapter introduces the network security program grounded on the technology of Intrusion Detection. As a reasonable complement to Firewall, Intrusion Detection can help the system to withstand the online attack, extend the abilities of the system manager in security management, and increase the integrity of basic construction in information security. The program collects and analyzes information from the key points in the network. Intrusion Detection is regarded as the second guard gate, which monitors the network without affecting its operation.The forth chapter expounded the network security program based on Waterwall, which is an potent supplementaty to Firewall, virtual special-purpose net, the Intrusion Detection system etc. The government agencies, defense industries, confidential enterprises and public institutions can take advantage of the program to protect their interior nets by applying and depoying it. In doing so, the risk of leaking the secret is lowered, and the practical effectiveness is achieved.With the example of information security transformation in Weiyuan Brewery in Sichuan Province, the fifth chapter presents UTM (Unified Threat Management ), which re-adjust and optimizes such high-performance safety protections as Firewall, Anti-virus, Anti-spam, VPN, Load balancing, ADSL management, Intrusion Detection, Information filting. The UTM is superior in performance and cost, which holds good for small and mid-scale businesses that put emphasis on information security while fail fo afford the cost of manpower and resources.The contents of the thesis include as follows:â‘ The current situation and the needs of information security in small and mid-scale enterprises.â‘¡The solutions to information security based on Firewall, Intrusion Detection, Waterwall and UTM in small and mid-scale enterprises.â‘¢The solution to information security designed for Weiyuan Brewery in Sichuan Province.â‘£Hope for the future development of information security industry in our country.
Keywords/Search Tags:Information Security, Firewall, Intrusion Detection, Waterwall, Unified Threat Management
PDF Full Text Request
Related items