太赫兹科学与电子信息学报, 2019, 17 (1): 158, 网络出版: 2019-04-07   

中小型企业网络安全方案的设计

Network security scheme design for small and medium-sized enterprises
作者单位
1 商洛学院 数学与计算机应用学院,陕西 商洛 726000
2 西安理工大学 计算机科学与工程学院,陕西 西安 710048
摘要
为了提高企业竞争力和经济效益,以中小型企业为例,分析了网络安全的相关理论技术,探讨了中小型企业网络安全需求,理清现有中小型企业整个网络结构和网络拓扑图,对其存在的问题进行了梳理,然后设计了一个较为完善的企业网络拓扑图。从物理环境安全、网络边界安全、网络内部安全等方面进行了加固和规划,提高中小型企业的网络安全等级。
Abstract
In order to improve the competitiveness and economic benefits of enterprises, the use of network technology for business processing is the inevitable trend of social development. Network security issues attract more and more attention. This paper takes the small and medium-sized enterprises as example, analyzes the relevant theories and technologies of network security, discusses the network security requirements of small and medium-sized enterprises, and clarifies the whole network structure and network topology of small and medium-sized enterprises. And then a more complete enterprise network topology is designed. Through the reinforcement on the physical environment security, network border security, and the network security, the network security level of small and medium-sized enterprise is improved.
参考文献

[1] 金俊才,许超超. 企业级服务器虚拟化性能评估方法[J]. 计算机系统应用, 2015,24(7):1-7. (JIN Juncai,XU Chaochao. Performance evaluation of the enterprise-level virtualization[J]. Computer Systems Applications, 2015,24(7):1-7.)

[2] 朱建明,宋彪,黄启发. 基于系统动力学的网络安全攻防演化博弈模型[J]. 通信学报, 2014,35(1):54-61. (ZHU Jianming, SONG Biao,HUANG Qifa. Evolution game model of offense-defense for network security based on system dynamics[J]. Journal on Communications, 2014,35(1):54-61.)

[3] 文志诚,陈志刚,唐军. 基于时间序列分析的网络安全态势预测[J]. 华南理工大学学报(自然科学版), 2016,44(5):137-143. (WEN Zhicheng,CHEN Zhigang,TANG Jun. Prediction of network security situation on the basis of time series analysis[J]. Journal of South China University of Technology(Natural Science Edition), 2016,44(5):137-143.)

[4] 周诚,李伟伟,莫璇. 一种网络安全脆弱性评估方法[J]. 江苏大学学报(自然科学版), 2017,38(1):68-77. (ZHOU Cheng, LI Weiwei,MO Xuan. A assessment method of network security vulnerability[J]. Journal of Jiangsu University(Natural Science Edition), 2017,38(1):68-77.)

[5] 王栋,陈传鹏,颜佳. 新一代电力信息网络安全架构的思考[J]. 电力系统自动化, 2016,40(2):6-11. (WANG Dong,CHEN Chuanpeng,YAN Jia. Pondering a new-generation security architecture model for power information network[J]. Automation of Electric Power Systems, 2016,40(2):6-11.)

[6] 芦荻,商慧琳. 基于反导作战环的装备作战网络能力评估[J]. 太赫兹科学与电子信息学报, 2016,14(3):372-377. (LU Di,SHANG Huilin. Assessment of equipment operation network capability based on the anti-missile operation loops[J]. Journal of Terahertz Science and Electronic Information Technology, 2016,14(3):372-377.)

[7] 黄雁,邓元望,王志强. 可入侵检测的移动Ad Hoc网络安全综合评价[J]. 中南大学学报(自然科学版), 2016,47(9):3031-3039. (HUANG Yan,DENG Yuanwang,WANG Zhiqiang. Comprehensive evaluation of security of mobile ad hoc network with intrusion detection[J]. Journal of Central South University(Natural Science Edition), 2016,47(9):3031-3039.)

[8] 陈兴蜀,曾雪梅,王文贤. 基于大数据的网络安全与情报分析[J]. 工程科学与技术, 2017,49(3):1-11. (CHEN Xingshu, ZENG Xuemei,WANG Wenxian. Big data analytics for network security and intelligence[J]. Advanced Engineering Sciences, 2017,49(3):1-11.)

[9] 赵冬梅,李红. 基于并行约简的网络安全态势要素提取方法[J]. 计算机应用, 2017,37(4):1008-1013. (ZHAO Dongmei, LI Hong. Approach to network security situational element extraction based on parallel reduction[J]. Computer Systems Applications, 2017,37(4):1008-1013.)

[10] 孙琳,潘登,刘荻. 基于预约诊疗模式下的医院网络安全设计[J]. 现代电子技术, 2017,40(3):82-84. (SUN Lin,PAN Deng, LIU Di. Design of hospital network security based on reservation and treatment mode[J]. Modern Electronics Technique, 2017,40(3):82-84.)

[11] 屈正庚. 基于信息中心的运营监控模型设计[J]. 太赫兹科学与电子信息学报, 2015,13(2):327-331. (QU Zhenggeng. Design of operation monitoring model based on information center[J]. Journal of Terahertz Science and Electronic Information Technology, 2015,13(2):327-331.)

[12] 杨乐. 分散控制系统信息安全方案探讨[J]. 石油化工自动化, 2017,53(3):1-4. (YANG Le. Discussion on information security design of distributed control system[J]. Automtion in Petro-Chemical Industry, 2017,53(3):1-4.)

[13] 蒋笑冰. 铁路移动办公系统安全防护方案的研究[J]. 铁路计算机应用, 2015,24(9):22-26. (JIANG Xiaobing. Security protection scheme for railway mobile office automation system[J]. Railway Computer Application, 2015,24(9):22-26.)

[14] 张爱玲. 移动运营商网络安全管理平台架构分析与探索[J]. 科技通报, 2017,33(2):90-94. (ZHANG Ailing. Mobile operator's network security management platform architecture analysis and exploration[J]. Bulletin of Science and Technology, 2017,33(2):90-94.)

[15] 何雪海,黄明浩,宋飞. 网络安全用户行为画像方案设计[J]. 通信技术, 2017,50(4):789-794. (HE Xuehai,HUANG Minghao, SONG Fei. User behavior profiling scheme for network security[J]. Communications Technology, 2017,50(4):789-794.)

[16] 罗福强,李瑶,范展源. 灾害与突发事件ICU大数据平台的安全设计[J]. 计算机技术与发展, 2016,26(10):69-72. (LUO Fuqiang,LI Yao,FAN Zhanyuan. Safety design of ICU big data platform for disaster and sudden event[J]. Computer Technology and Development, 2016,26(10):69-72.)

屈正庚, 吕鹏. 中小型企业网络安全方案的设计[J]. 太赫兹科学与电子信息学报, 2019, 17(1): 158. QU Zhenggeng, LYU Peng. Network security scheme design for small and medium-sized enterprises[J]. Journal of terahertz science and electronic information technology, 2019, 17(1): 158.

本文已被 1 篇论文引用
被引统计数据来源于中国光学期刊网
引用该论文: TXT   |   EndNote

相关论文

加载中...

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!