Please wait a minute...
Computer & Telecommunication  2017, Vol. 1 Issue (9): 27-29    DOI:
Current Issue | Archive | Adv Search |
IDC Security Construction Strategy for Telecom Carriers
ChenWenyao
China Telecom Shanghai Branch
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  With the continuous development of Internet applications, telecom carriers invest more and more in IDC. In the construction of IDC, telecom carriers concern more about the security and stability according to the needs of the telecom service guarantee. In this paper, the design principle of IDC is analyzed, and some security problems are explained respectively from the network layer, business layer and basic management. Some measures about device security strategy construction and network isolation are proposed to implement the security construction strategy for IDC.
Key wordsIDC      telecom carriers      security defense      construction strategy     
Published: 02 September 2017
ZTFLH:  TP393  

Cite this article:

ChenWenyao. IDC Security Construction Strategy for Telecom Carriers. Computer & Telecommunication, 2017, 1(9): 27-29.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2017/V1/I9/27

[1] CHENWen-yao. IDC Core Network Design for Telecom Carriers[J]. 电脑与电信, 2018, 1(3): 40-42.
[2] Chen Fenglian, Liu Tao. Full Service Operation -- Design of the IDC Network of Mobile Corporation[J]. 电脑与电信, 2015, 1(8): 49-56.
[3] Hu Chun. Construction and Implementation of Campus Network Security Defense System[J]. 电脑与电信, 2015, 1(1-2): 27-28.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd