期刊文献+

中小企业网络安全整体解决方案 被引量:2

Minor Enterprises Overall Network Security Solutions
下载PDF
导出
摘要 文章从网络信息安全的发展现状和发展前景去看,对我国中小型企业的网络安全现况进行了剖析。大多数中小型企业由于资金、技术问题,安全问题一直隐含重重。有些中小型企业抱着侥幸的心理对待网络入侵、病毒问题以及数据丢失,这种心态导致企业本身对安全问题的轻视,以致问题一旦出现造成巨大的经济损失。通过分析中小型企业计算机网络的安全需求,以及对网络安全构成威胁的各种隐患,制定出基本的安全策略,提出了一个网络安全的总体解决方案,适用于中小型企业的网络组建。 This issue based on the development of network information security status analyzes small and medium-sized enterprises of Chi-na's network security status.Most small and medium-sized enterprises because of funding,technical issues,security issues have been heavily implied.Some small and medium enterprises luck with the psychological treatment of network intrusion,viruses and data loss problem,this attitude led to the enterprise itself ignored the question of safety so that once the problem caused enormous economic losses.This paper in-troduces a security solution applicable to small and medium enterprises network systems.The basic security policy can be made through an-alyzing the security demand and various potential threats to the computer networks of small and medium enterprises.According to this pol-icy,we propose a total solution for network security of small-and medium-sized enterprise network systems.
作者 王楠 WANG Nan(School of Software Engineering,Tongji University,Shanghai 201804,China)
出处 《电脑知识与技术》 2010年第5期3350-3352,共3页 Computer Knowledge and Technology
关键词 中小企业 网络安全 网络入侵 防火墙 防病毒 minor enterprise network security network intrusion firewall Anti-virus
  • 相关文献

参考文献7

二级参考文献16

  • 1戚丽,蒋东兴,武海平,冯珂.校园数据中心建设与管理方法的探索[J].中国教育信息化(高教职教),2002,0(S1):54-55. 被引量:24
  • 2Rebecca Gurley Bace 陈明奇.人侵检测[M].北京:人民邮电出版社,2001..
  • 3Trusted Computer System Evaluation Criteria (TCSEC), US DoD 5200. 28- STD, December 1985.
  • 4蒋东兴.清华大学数字校园建设发展与规划.实验技术与管理,2000,.
  • 5Rolf Oppliger 杨义先 等.WWW安全技术[M].北京:人民邮电出版社,2001..
  • 6蒋建春 冯登国.网络入侵检测原理与技术[M].北京:国防工业出版社,2000..
  • 7High-Performance Communication Networks.Jean Walrand,Pravin Varaiya,2nd Edition,Morgan Kaufmann Publishers Inc.
  • 8Reference Model for Firewall Technology and its Implications for Connection Signaling.J.Bryan Lyles and Christoph L.Schuba.Proceedings Open Signaling Workshop,Columbia University,NY,October 1996.
  • 9Denning .D.An Inrusion Detection Model ,IEEE Transactions on Software Engineering,1987,13(2)222-232.
  • 10.[EB/OL].http:∥www.netstd.com/.,.

共引文献85

同被引文献7

  • 1范荣真.计算机网络安全技术[M].北京:清华大学出版社.北京交通大学出版社,2010.
  • 2Vance, Bill. "Employees are your greatest assets'" in security too! " March 2001.www.techxans.org/resources/techxans.ppt.
  • 3王达.网管员必读一网络安全[M].北京:机械工业出版社,2009.
  • 4Information Security Forum. Information Security Standards. London: Information Security Forum, September 2001.p.1.
  • 5King, Dalton, Osmanoglu. Security Architecture Design, Deployment, & Operations. New York: RSA Press, 2001. p. 13-39, 41-65, 111-138, 141-175.
  • 6严霄凤.关于国家网络信任体系建设的思考[J].信息安全与技术,2011,2(4):3-4. 被引量:5
  • 7李静,张松林,高建.中小企业信息网络安全与防护分析[J].辽宁高职学报,2017,19(12):91-93. 被引量:2

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部