Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
Design and Deployment of Enterprise Network Security Scheme
YE Zheng-qiang 1, LI Jia 2
1. Eye & Ent Hospital of Fudan University; 2. Shanghai Computer Software Technology Development Center
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  With the expansion of the enterprise scale and the expansion of its branches, the enterprise network architecture becomes more complex and faces various security threats. This paper firstly introduces the basic situation of enterprise network environment.Based on the requirement of enterprise information system, the network security protection technologies are introduced,and then the design and deployment of network security protection program is put forward, expecting to provide some reference for related work.
Key wordsnetwork security      enterprise network      firewall      protection     
:  TP309.1  

Cite this article:

YE Zheng-qiang , LI Jia . Design and Deployment of Enterprise Network Security Scheme. Computer & Telecommunication, 2018, 1(1-2): 53-54.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2018/V1/I1-2/53

[1] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[2] BAO Hai-yan. Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security[J]. 电脑与电信, 2024, 1(1): 4-7.
[3] ZHOU Hong-ya. Design and Implementation of Eyesight Protector Based on Single Chip Microcomputer[J]. 电脑与电信, 2021, 1(9): 71-.
[4] TONG Wei HUANG Qi-ping.
Optimization Strategy of Privacy-oriented BRNN Protection
[J]. 电脑与电信, 2021, 1(12): 58-61.
[5] LAI Jin-zhi.
Research and Practice of Network Security Management of Industrial Control System
Based on PDCA Circulation
[J]. 电脑与电信, 2021, 1(11): 12-15.
[6] ZHUANG Yuan-xiang. Teaching Research on Network Security in Technical Schools[J]. 电脑与电信, 2021, 1(1): 62-67.
[7] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[8] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[9] LI Jun-tao. Security Research on Internet of Things Based on NB-IoT Network[J]. 电脑与电信, 2020, 1(7): 62-64.
[10] XIE Feng MENG Jin DING Wei REN Zhao-peng . Overview of Network Structure Transformation and Network Security Construction Based on MajorActivities Guarantee[J]. 电脑与电信, 2020, 1(6): 57-62.
[11] Peng Li-xun Liu Feng-kai. Resource RecommendationAlgorithm Based on K-anonymity for Generalizing User Query Requests[J]. 电脑与电信, 2020, 1(6): 66-73.
[12] ZHONG Yu-ming CHEN Chang-hui. Exploration of Network and Information Security[J]. 电脑与电信, 2020, 1(5): 33-35.
[13] ZHOU Xiao-juan. Discussion on the Computer Network Security and Preventive Measures in the Era of Big Data[J]. 电脑与电信, 2020, 1(3): 41-43.
[14] CAI Chang-hao LU Chang-xing HATe SUN Ruo-xi XIN Yu-liang. Research on User Privacy Protection Method in Logistics Industry[J]. 电脑与电信, 2020, 1(12): 75-79.
[15] WANG Shuai ZHANG Gui-jie. AMeasure of Trajectory Similarity Based on a Negative Correlation with Distance[J]. 电脑与电信, 2020, 1(11): 60-64.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd