首页 | 本学科首页   官方微博 | 高级检索  
     

利用访问列表技术对中小企业网络安全的研究
引用本文:蒲麟.利用访问列表技术对中小企业网络安全的研究[J].网络安全技术与应用,2014(3):148-148,151.
作者姓名:蒲麟
作者单位:荆州市沙市钢管厂,湖北434000
摘    要:随着网络科技的进步的发展,企业在应用电子商务进行业务发展的同时,更加要重视网络安全的建设,维护企业的互联网信息安全,这些是目前我国中小企业首要加强管理的薄弱环节。本文基于对访问列表技术的研究,讨论了访问列表在维护系统安全方面的作用和应用范围,并给出了基本的配置过程以及防范策略,以满足中小企业在网络安全方面的管理要求,最大化的维护好商务贸易环境,这对于企业在未来展开更广泛的业务奠定了稳健的基石。

关 键 词:网络安全  企业  访问列表

Research on access list technology to the network security of small and medium enterprises use
Pu Lin.Research on access list technology to the network security of small and medium enterprises use[J].Net Security Technologies and Application,2014(3):148-148,151.
Authors:Pu Lin
Abstract:with the development of network technology, the business development and enterprise in the electronic commerce application, more attention should be paid to the construction of network security, safeguarding lnternet information security enterprises, these are small and medium enterprises in China mainly to strengthen the weak links in management.This paper studies the access list technology based on the scope of application, and the access list in the maintenance of system security discussion, and gives the configuration process and prevention strategies, in order to meet the requirements in the aspects of network security management of small and medium-sized enterprises, to maximize the maintenance of good business environment, which laid the foundation for the enterprise steady the more extensive business in the future.
Keywords:network security  enterprises  access list
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号