| The rapid development of the net has a profound impact on the country' s political, economic, military, cultural and other fields, At the same time the net's openness and vulnerability brought about by the security risk to the healthy development of the net has brought the impact can not be ignored, Network and information security technology in national security, national defense played an important role. Network and information security problems not only to the relevant units and cause inconvenience to users, and has been a threat to national information security and economic development. Network and Information Security from 1995 has become China' s information development strategy of an important part in the 16th through the Fourth Plenary "on strengthening the party' s ability to govern the resolution", information security and political, economic and cultural security Tied to the four major themes, to be referred to an unprecedented height.This paper described the relevant domestic and international network and information security technology system and management system, Including the theory and application of technology, while analysis of the current network and information security technology of the status quo, and national security significance and role of network and information security needs and some research focus. And the establishment of confidential internal network with the actual work of the technical system theory and management system, with greater length on the analysis based on the popular anti-virus technology, data encryption and password algorithm, Waterproof walls, malicious code prevention, intrusion detection system, Windows2000 operating system security configuration, the theoretical analysis and practical hands-operation, identify and implement the establishment of this paper, the network of confidential internal network topology, the establishment of computer virus prevention system, System and the waterproof wall structures and related network and information security system building.The full text of the actual work of the greatest innovation lies in the analysis of the paper, with the series of operational and construction process, the unit will be kept confidential within the network over the years building the difficult and doubtful to be addressed and ultimately contributed to this paper, the secrecy involved in the internal network Gradually built. |