首页 | 本学科首页   官方微博 | 高级检索  
     

电信运营商IDC安全构建策略
引用本文:陈文尧.电信运营商IDC安全构建策略[J].广东电脑与电讯,2017,1(9):27-29.
作者姓名:陈文尧
作者单位:中国电信股份有限公司上海分公司
摘    要:随着互联网应用的不断发展,电信运营商在IDC的投入越来越多。电信运营商在IDC建设中,结合电信级服 务保障的需求,对安全性、稳定性十分关注。本文分析了电信运营商IDC设计原则,并从网络层、业务层、基础管理三个方面, 分别阐述了IDC存在的一些安全问题,且提出通过设备安全策略构建、网络隔离等措施,实施IDC的安全构建策略。

关 键 词:互联网数据中心  电信运营商  安全防御  构建策略  

IDC Security Construction Strategy for Telecom Carriers
ChenWenyao.IDC Security Construction Strategy for Telecom Carriers[J].Computer & Telecommunication,2017,1(9):27-29.
Authors:ChenWenyao
Abstract:With the continuous development of Internet applications, telecom carriers invest more and more in IDC. In the construction of IDC, telecom carriers concern more about the security and stability according to the needs of the telecom service guarantee. In this paper, the design principle of IDC is analyzed, and some security problems are explained respectively from the network layer, business layer and basic management. Some measures about device security strategy construction and network isolation are proposed to implement the security construction strategy for IDC.
Keywords:IDC  telecom carriers  security defense  construction strategy  
点击此处可从《广东电脑与电讯》浏览原始摘要信息
点击此处可从《广东电脑与电讯》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号