期刊文献+

办公网络安全策略研究及技术实现 被引量:7

Research and Implementation of Office Network Security Policy
下载PDF
导出
摘要 随着因特网(Internet)技术的飞速发展,办公网络已经成为党政机关、学校、企业日常管理工作不可或缺的工作平台。由于办公网络流程控制的复杂性和数据的敏感性,决定了办公网络将比普通公众网络需要更高的安全性和可靠性。本文从办公网络的结构、功能和特点出发,分析办公网络的主要威胁来源和攻击手段,根据P2DR网络安全模型的要求,将安全策略由下至上划分为网络层、系统层和应用层三个层次,分别阐述各个层次上的安全原则和实现方式。 With the rapid development of Internet technology, office network has become an indispensable working platform of dai- ly management for governments, schools and enterprises. Because of the complexity of the procedure controlling and the sensibili- ty of the data, compared with the general public network, office network needs to be more secure and reliable. This essay analy- zes the main threatening sources and the attacking approaches of office network on the basis of structures, functions and character- istics of office network. According to the requirements of P2DR network safety model, it separates the security strategy into 3 Lay- ers, which is network layer, system Layer and application Layer. Besides, it also elaborates the security principles and the approa- ches of each Layer.
作者 李结松
出处 《计算机与现代化》 2012年第3期98-102,共5页 Computer and Modernization
关键词 办公网络 P2DR 安全策略 VPN 认证 授权 入侵检测 office network P2DR security policy VPN authentication authorization IDS
  • 相关文献

参考文献14

二级参考文献18

  • 1盛思源,战守义,石耀斌.网络安全技术的研究和发展[J].系统仿真学报,2001,13(S2):419-422. 被引量:21
  • 2卫哲.网络欺诈进入高发期[J].刚络与信息,2010,. 被引量:1
  • 3Zao J,Sanchez L.Domain Based Internet Security Policy Management[A].Proc of DARPA Information Survivability Conf and Exposition[C].2000.41-53. 被引量:1
  • 4Yang Yanyan,Fu Zhi (Judy).Bands:An Inter-Domain Internet Security Policy Management System for IPSec VPN[A].Integrated Network Management[C].2003.231-244. 被引量:1
  • 5Ahn Gaeil,Yoon Seungyong,Kim Kiyoung,et al.Security Policy Decision for Automation of Security Network Configuration[A].Proc of the 9th Asia-Pacfic Conf on Communication[C].2003.1057-1061. 被引量:1
  • 6Shan Rongsheng,Li Shenghong.Network Security Policy for Large-Scale VPN[A].Proc of ICCT'03[C].2003.217-220. 被引量:1
  • 7蒋韬 刘积仁.VPN系统及其安全策略服务机制的研究.计算机研究与发展,2000,37(9):139-144. 被引量:1
  • 8Shipley,Greg.Anatomy of a Network Intrusion[].Network Computing.1999 被引量:1
  • 9Rubin,Jeffrey,O’Shea,Timothy.Axent NetProwler: Advanced Intrusion Detection on the Loose[].Network Computing.1999 被引量:1
  • 10DavidKlugHoney.PotsandIntrusionDetection. http://www.sans.org/infosecFAQ/honeypots.htm . 20000913 被引量:1

共引文献85

同被引文献47

引证文献7

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部