(电商系毕业论文范文格式)正文[1]-3

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

成都信息工程学院银杏酒店管理学院本科毕业论文I网络环境下企业信息安全分析与对策摘要:随着计算机技术与通信技术的飞速发展,信息已成为企业发展的关键,但是企业在享受着信息系统给公司带来巨大经济效益的同时,也面临着非常大的安全风险。因此,这就使得企业必须重新审视当前信息系统所面临的安全问题,并从中找到针对企业行之有效的安全防范技术。本文从物理安全,系统安全,应用管理安全,黑客攻击,病毒危害等方面对企业网络所面临的安全问题进行了分析与研究,并提出一系列解决的对策,包括:通过划分VLAN的方法,使用加密技术、身份认证技术来保证系统安全;依靠预防黑客攻击技术和网络防病毒技术解决与外部网络连接时产生的网络安全问题;通过建立安全管理体系来应对管理上的漏洞。文章最后用一实例来说明如何构建企业信息安全体系。关键词:信息安全管理体系网络技术(关键词不能超过5个)成都信息工程学院银杏酒店管理学院本科毕业论文IITheEnterpriseInformationSecurityAnalysisandCountermeasuresUnderTheNetworkEnvironmentAbstract:AlongwiththeRapiddevelopmentofcomputertechnologyandCommunicationstechnology,informationhasbecomethekeytotheenterprisedevelopment,butenterpriseenjoystheinformationsystembringinghugeeconomicefficiencytothecompanieswellasfacestheverylargesecurityrisk.Therefore,Thismakestheenterprisemustre-examinethesecurityproblemsofcurrentinformationsystemfaces.andfindouteffectivesafeguardtechnologyforenterprisefromit.ThearticlehasmaketheAnalysisandResearchoftheEnterprisefacingnetworksecurityproblemsfromtheaspectsofPhysicalsecurity,systemsecurity,applicationsecurity,managementsecurity,hackerattacks,virusdamageandsoon,Andputsforwardaseriesofcountermeasurestosolve,including.ThroughthemethodofdividingVLAN,useencryptiontechnology、authenticationtechnologytoguaranteesystemsecurity;relyonthepreventinghackerattackstechnologyandthenetworkanti-virustechnology,solvethenetworksecurityproblemwhenconnecttheexternalnetwork;Dealswiththeloopholesinmanagementtheestablishmentofasafetymanagementsystem.Atlast,withanexampletoillustratehowtobuildenterpriseinformationsecuritysystemKeywords:InformationsecurityManagementsystemNetworktechnology1.页眉:成都信息工程学院银杏酒店管理学院本科毕业论文,居中。2.页脚:摘要及目录采用ⅠⅡⅢ,正文采用1、2、3、4……,居中。成都信息工程学院银杏酒店管理学院本科毕业论文III目录引言.....................................................................................................................................................11信息安全的相关定义.....................................................................................................................11.1信息安全................................................................................................................................11.2信息安全的基本属性............................................................................................................22网络环境下企业信息安全分析.....................................................................................................32.1物理安全................................................................................................................................32.2系统安全................................................................................................................................32.3黑客攻击................................................................................................................................42.4网络病毒风险........................................................................................................................42.5应用管理安全........................................................................................................................53网络环境下企业信息安全对策.....................................................................................................53.1物理安全对策........................................................................................................................53.1.1机房环境安全...........................................................................................................53.1.2通信线路安全...........................................................................................................53.1.3电源等设备安全.......................................................................................................63.2系统安全对策........................................................................................................................63.2.1VLAN(虚拟局域网)技术.....................................................................................63.2.2认证技术...............................................................................................................73.2.3信息加密技术.......................................................................................................83.3黑客攻击对策........................................................................................................................83.3.1防火墙技术...............................................................................................................83.3.2入侵检测技术.........................................................................................................103.4网络病毒对策......................................................................................................................113.4.1病毒防治体系特性.................................................................................................113.4.2病毒防治软件安装.................................................................................................113.4.3病毒防护体系的自动控制.....................................................................................123.5应用管理安全对策.........................................................................

1 / 26
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功