Font Size: a A A

Design And Implementation Of Inner Mongolia Electric Power Information Network Anti-virus System

Posted on:2017-05-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y YangFull Text:PDF
GTID:2272330485461326Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the development of Internet technology, the Internet has been everywhere, while the spread of the virus through the Internet so that all walks of life are threatened. Rate computer viruses spread faster and faster, it is already one of the biggest threats to Internet security threats. To meet the increasing Internet security requirements, the need for a comprehensive anti-virus system to protect the security of Inner Mongolia Electric Power Information Network.Computer virus due to Internet to diversified development, mainly in the mode of transmission diversity, species diversity, and endanger pluralism. Safety objective is to avoid its intentional and unintentional attacks and intrusion prevention without authorization and access, access to the computer and prevent others counterfeit disclosure of information. Therefore, the establishment of anti-virus system when you want to apply a lot of security technology, safety management methods, the use of three-dimensional multi-layer anti-virus system to guarantee the security of the Power Information Network.In this paper, computer viruses and anti-virus technology development overview, on the basis of the existing status quo and Inner Mongolia Power Grid network firewall on the shortcomings of the Power Information Network proposed requirement analysis. Proposed anti-virus system according to the propagation characteristics of the virus and the invasion route design principles, the final design of a multi-dimensional complete virus attack defense system, and the system architecture, composition, and management systems are discussed. Finally, a detailed exposition of the Inner Mongolia Electric Power deployment of anti-virus program design are discussed. Including mail security gateway deployment, the deployment of anti-virus software application files and network client firewall deployment. Finally, the full text summary and outlook.
Keywords/Search Tags:power information network, viruses, anti-virus system, intrusion detection
PDF Full Text Request
Related items