Font Size: a A A

Build The Credibility Of The Large Commercial Chain Network Countermeasures

Posted on:2010-10-29Degree:MasterType:Thesis
Country:ChinaCandidate:H WangFull Text:PDF
GTID:2208360275462586Subject:E-government
Abstract/Summary:PDF Full Text Request
At present, large state-owned enterprise groups, the majority of the development strategy is based on the main lines of business-oriented and take the related diversification or unrelated diversification route. Result of the development of this model are in the group will form a multi-industry sub-groups, but the majority of the various sub-groups will form the rapid expansion of the chain. Information system as the core competitiveness of enterprises carrying platform, should enable the enterprise operation and management mode to run efficiently. Information system architecture as the foundation of the network platform is a large group of the carrier of all information systems, how to build a large state-owned enterprise to support the rapid development of the credibility of the network platform, has become practical significance of research work.With the rapid development of information technology, network security problem has increasingly become the focus of enterprises. Traditional network security system to face the newly emerging network security is showing more and more unable to case characteristics. Virus protection software updates lag behind the virus, in view of the system vulnerability "zero-day attacks," the formation of a black horse rampant industrial chain, the network operator internal users irregularities and other issues of traditional network security posed a severe challenge.In order to better respond to the above-mentioned problem, the concept of Trusted Network raised. At the credibility of the network concept, with particular emphasis on a variety of acts, behavior-based management is also a traditional network security do not have. Comprehensively improve the overall defensive capabilities of the network are the objectives of the credibility of the network, to achieve the goal of security must be the full integration of resources and management, security, survivability and manageability necessarily organic blend. Have overall awareness of the overall situation from the point of view to carry out risk analysis assessment and management, and then at the overall scope of customization and distribution strategy, and environmental conditions in time to follow changes in the smart adjustments.In this paper, the practice of using theory to guide the way, in combing the development of network security based on the credibility of the current network of research carried out multi-angle analysis, and on this basis to develop prospects. Combination of theoretical concepts on the construction project informationization floor, put the theory of combining with the actual situation, in order to provide a useful practical reference.
Keywords/Search Tags:Trustworthy Network, Network Security, Trusted Network Connect, Multiprotocol Label Switching Virtual Private Network, Intrusion Prevention System, Unified Threat Management
PDF Full Text Request
Related items