期刊文献+

浅析构建局域网的安全策略 被引量:1

Analysis of the Safety Strategies for Constructing LAN
下载PDF
导出
摘要 通过交换机技术构建局域网,实现提升网络安全、保护信息安全的目标。对交换机技术相关理论及应用措施进行探究,结合单位内App系统网络改造过程,分析交换机技术对网络安全性产生的积极作用。在局域网构建中,传统的防火墙技术局限性较大,应用交换机技术构建局域网能够提升安全性和稳定性。在局域网构建中应用交换机技术,可以有效杜绝安全隐患,创设更加安全的网络环境。 Achieving the objectives of improving network security and protecting information security by constructing a local area network(LAN)through the exchange technology.In this study,the related theory and application measures of the switch technology are explored.It is combined with the process of the network modification of the built-in APP system in the office and analyzes the positive effects of the switch technology on network safety.In the construction of LAN,the traditional firewall technology has great limitations.The application of switch technology in building LAN can improve the security and stability.Applying the switch technology in the construction of LAN can effectively eliminate safety hazards and create a more secure network environment.
作者 王志炜 WANG Zhiwei(Ningbo Fenghua District Integrated Media Center,Ningbo 315500,China)
出处 《中国有线电视》 2022年第1期33-35,共3页 China Digital Cable TV
关键词 局域网 网络安全 数据交换 LAN cyber security data exchange
  • 相关文献

参考文献6

二级参考文献24

  • 1薛海伟,徐长醒,林劼,都婧,戴一奇.局域网中的EL-BLP安全模型[J].清华大学学报(自然科学版),2009(S2):2228-2232. 被引量:1
  • 2司天歌,张尧学,戴一奇.局域网络中的L-BLP安全模型[J].电子学报,2007,35(5):1005-1008. 被引量:16
  • 3Atkins D 严伟等译.Internet网络安全专业参考手册[M].北京:机械工业出版社,1998..
  • 4Sportack M.A Pappas F.C 等.高性能网络技术教程[M].北京:清华大学出版社,1998..
  • 5Northcutt S.网络入侵检测分析员手册[M].北京:人民邮电出版社,2001..
  • 6STANTON P. Security data in storage : a review of current research, 0409034 [ R ]. Urbana: University of Illinois at Urbana-Champaign, 2004.
  • 7BLAZE M. A cryptographic file system for Unix [ C ]//Proc of ACM Conference on Computer and Communications Security. New York: ACM Press, 1993:9-16.
  • 8FU K, KAASHOEK M F, MAZIERES D. Fast and secure distributed read only file system[ C ]//Proc of the 4th USENIX Symposium on Operating Systems Design and Implementation. 2000:181-196.
  • 9KALLAHALLA M, RIEDEL E, SWAMINATHAN R, et al. Plutus: scalable secure file sharing on untrusted storage[ C ]//Proc of the 2nd USENIX File and Storage Technologies. 2003:29-42.
  • 10GOH E, SHACHAM H, MODADUGU N, et al. SiRiUS: securing remote untrusted storage[ C ]//Proc of the 10th Network and Distributed Systems Security Symposium. 2003 : 131-146.

共引文献11

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部