首页 | 本学科首页   官方微博 | 高级检索  
     

办公网络安全策略研究及技术实现
引用本文:李结松.办公网络安全策略研究及技术实现[J].计算机与现代化,2012(3):98-102.
作者姓名:李结松
作者单位:广州医学院基础学院物理教研室
摘    要:随着因特网(Internet)技术的飞速发展,办公网络已经成为党政机关、学校、企业日常管理工作不可或缺的工作平台。由于办公网络流程控制的复杂性和数据的敏感性,决定了办公网络将比普通公众网络需要更高的安全性和可靠性。本文从办公网络的结构、功能和特点出发,分析办公网络的主要威胁来源和攻击手段,根据P2DR网络安全模型的要求,将安全策略由下至上划分为网络层、系统层和应用层三个层次,分别阐述各个层次上的安全原则和实现方式。

关 键 词:办公网络  P2DR  安全策略  VPN  认证  授权  入侵检测

Research and Implementation of Office Network Security Policy
LI Jie-song.Research and Implementation of Office Network Security Policy[J].Computer and Modernization,2012(3):98-102.
Authors:LI Jie-song
Affiliation:LI Jie-song(Physics Department of Basic Science School,Guangzhou Medical College,Guangzhou 510182,China)
Abstract:With the rapid development of Internet technology,office network has become an indispensable working platform of daily management for governments,schools and enterprises.Because of the complexity of the procedure controlling and the sensibility of the data,compared with the general public network,office network needs to be more secure and reliable.This essay analyzes the main threatening sources and the attacking approaches of office network on the basis of structures,functions and characteristics of office network.According to the requirements of P2DR network safety model,it separates the security strategy into 3 layers,which is network layer,system layer and application layer.Besides,it also elaborates the security principles and the approaches of each layer.
Keywords:office network  P2DR  security policy  VPN  authentication  authorization  IDS
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号