A Corporate Computer Network Security System Design and Implementation

2014 ◽  
Vol 1044-1045 ◽  
pp. 965-967 ◽  
Author(s):  
Lan Jiang

With the rapid development of economy and society, the growing prosperous computer network technology has now become one of the indispensable elements in human life. Small to every household personal computer systems, large to computer systems concerned countries, they are incorporated into the scope of computer network security systems. Enterprises are social living cells, with important role of financial intermediation, the mining technology and training personnel. Corporate computer systems is an important part to ensure high-speed operation of enterprises, summarize business information and protect trade secrets, therefore, the more developed computer network technology is, the more important the development and maintenance of corporate computer network security systems is. This article will explore the design and function of enterprise computer network security system implementations based on the characteristics of computer network security and enterprise computer network system.

2014 ◽  
Vol 687-691 ◽  
pp. 2007-2010
Author(s):  
Xiao Ru Sun

With the rapid development and application of the computer network technology, computer network system has brought many unsafe hidden dangers to the user. The computer network security has got more and more attentions of people. Therefore, this paper analyzes the main problems in computer network security and proposes some effective preventive measures. The author hopes these will help the computer network plays better role for people.


2013 ◽  
Vol 443 ◽  
pp. 517-520
Author(s):  
Hua Wu ◽  
Hai Shun Wang

The computer network security system is the basic condition to ensure the users to operate the computer safely. It is as well an important content of the development and research for the network system. Analyzing from the perspective of the operation effects of the traditional networking security system, there are still quite apparent shortages in the structure composition. It has not only caused the increase of the research and development costs of the system, but also has brought a great deal of inconveniences for the users to operate the system. In order to meet the requirements for high-performance system of the users, it is of great importance to carry out the optimization improvement on the structures of the computer network security system. Focusing on this point, this paper has explored on the shortages of the traditional computer network security system. In addition to this, it has brought out an effective optimization scheme for the structure.


2013 ◽  
Vol 321-324 ◽  
pp. 2630-2634
Author(s):  
Xiao Hong Yang ◽  
Yue Feng Chen

With the rapid development of computer and network technology, the security of computer network becomes the most important issue. For the computer network, it not only takes convenience to us, but also takes troubles, such as network security, virus, cockhorse etc.. In this article, we analyse the cause of the security,and then introduce a number of measures of vulnerability detection and protection on computer network security.


2013 ◽  
Vol 433-435 ◽  
pp. 1720-1723
Author(s):  
Jun Ruan ◽  
Pan Zhang ◽  
Hong Bi Ding

With the rapid development of computer network technology, global information has become mega-trend of modern social development. But due to all kinds of defects existing in the network itself and variety and openness of network interconnection form, network security has become the focus of social attention. So in this paper, a lot of current advanced network security technologies and products are used in order to make network security, which is under the general principles of network security situation.


2010 ◽  
Vol 108-111 ◽  
pp. 168-171 ◽  
Author(s):  
Hong Yun Xu

With the rapid development of network technology, computer network applications in the financial system is becoming increasingly popular, the financial network security issues become increasingly prominent. This paper through the analysis of various risks faced by current financial networks, proposes the design principles of financial network security architecture and the design goals of financial network security architecture, finally gives the design patterns of financial network security architecture.


2014 ◽  
Vol 687-691 ◽  
pp. 1720-1723
Author(s):  
Xu Wang

With the rapid development of network science and technology, people are dependent on the network and usage greatly improved, but the network to bring convenience, but it also brings a lot of network security issues, it has become a constraint library computer network construction greatest limiting factor. This paper describes the impact of the library computer network system security management of specific issues, according to the system requirements of practical application, in terms of the system operating environment, hardware systems, software systems, network systems and system data, such as design of the library computer network system security policy and implementation are discussed. Through the library computer network security threats faced by the system proposed safety management, regulations are important to ensure the development and implementation of computer network system security. Proposed library computer network system security management strategies, we hope to enhance the library computer network security have some help.


2018 ◽  
Vol 2 (4-2) ◽  
pp. 360
Author(s):  
Deni Satria ◽  
Alde Alanda ◽  
Aldo Erianda ◽  
Deddy Prayama

The development of information technology is a new challenge for computer network security systems and the information contained in it, the level of awareness of the importance of network security systems is still very low. according to a survey conducted by Symantec, the desire to renew an existing security system within a year within a company has the result that only 13% of respondents consider changes to the security system to be important from a total of 3,300 companies worldwide as respondents. This lack of awareness results in the emergence of security holes that can be used by crackers to enter and disrupt the stability of the system. Every year cyber attacks increase significantly, so that every year there is a need to improve the security of the existing system. Based on that, a method is needed to periodically assess system and network security by using penetrarion testing methods to obtain any vulnerabilities that exist on the network and on a system so as to increase security and minimize theft or loss of important data. Testing is carried out by using internal network penetration testing method which tests using 5 types of attacks. From the results of the tests, each system has a security risk of 20-80%. From the results of these tests it can be concluded that each system has a security vulnerability that can be attacked.


Sign in / Sign up

Export Citation Format

Share Document