中小型企业中网络安全的解决方案
时间:2026-01-19
时间:2026-01-19
大连理工大学
本科生毕业设计(论文)
学 院:
专 业:
学 生:
指导教师:
完成日期:
中小型企业中网络安全的解决方案
大连理工大学本科生毕业设计(论文)
中小型企业中网络安全的解决方案
总计 毕业设计(论文)
表格
插图
50 页 8 表 23 幅
摘 要
随着网络飞速发展,企业早已通过网络应用与其客户或其他行业之间进行业务往来,但早期的网络建设对维护、管理等方面存在很大漏洞,随之而来的网络安全问题则日趋严重。
近年来,网络的攻击以及信息窃取等事件频发,对企业造成了不可估量的损失。这告诉我们,网络安全在网络建设中已经不是一项可有可无的技术,它逐渐成为保障企业发展的必要组成。
网络安全的解决方案不仅仅是技术的堆积,更重要是的要把安全技术因地制宜的融入到具体系统架构中。所以本文首先会对网络安全进行综述;其次通过对企业内网安全、边界网络安全、身份认证和访问控制、路由网络安全等进行策略规划,最后会介绍端口扫描、网络监听、密码破解、特洛伊木马、缓冲区溢出、拒绝服务攻击等一些主流的安全问题的防护等方便进行论述。
本文希望为企业建立一套完善的网络安全体系,使企业网络在日常的使用中把安全隐患和问题降到最低最小。为企业的日常运作保驾护航,使其在安全的网络环境中创造更多的经济效益。
关键词:网络安全;端口扫描;拒绝服务攻击;虚拟局域网
Abstract
With the rapid development of Internet, companies have already applied through the network between the industry and its customers or other business dealings, but the early network construction for maintenance, management and other aspects of many loopholes, followed by network security problems are getting worse.
In recent years, network attacks and information theft and other incidents frequently, the enterprise caused incalculable damage. This tells us that the construction of network security in the network is not a dispensable technology, it has become a necessary component of security of enterprise development.
Network security solutions not just technology accumulation, more importantly, to take local conditions into security technology specific system architecture. So this article will first network security were reviewed; Secondly, through the enterprise network security, perimeter security, authentication and access control, routing and network security for strategic planning, will eventually introduce port scanning, network monitoring, password cracking, Trojan horses , buffer overflows, denial of service attacks and other security issues in some mainstream protection, to facilitate exposition.
This article hopes for enterprises to establish a comprehensive network security system, so that the enterprise network in daily use to minimize security risks and problems minimal. The daily operation of the enterprise escort them in a secure network environment to create more economic benefits.
Key words:network security; port scanning; denial of service attack; vlan
目录
第一章 绪论 .................................................... 1
1.1 研究背景 .......................................................... 1
1.2企业现状分析 ...................................................... 1
1.2.1企业内网安全 ............................................ 1
1.2.2边界安全 ................................................ 2
1.2.3访问控制 ................................................ 2
1.2.4三层安全 ................................................ 2
1.3需要解决的问题 .................................................... 2
第二章 网络安全综述 ............................................ 4
2.1 网络安全的特征 .................................................... 4
2.2 网络安全策略 ...................................................... 5
2.2.1 网络物理安全策略 ........................................ 5
2.2.2 网络访问控制策略 ........................................ 5
2.2.3 网络信息加密策略 ........................................ 5
2.2.4 网络安全管理策略 ........................................ 5
第三章 企业内网安全 ............................................ 7
3.1 VLAN的应用 ...................................................... 7
3.1.1 VLAN的方法 ............................................ 7
3.1.2 交换机的接口类型 ........................................ 8
3.2 PVLAN技术的应用 .................................................. 8
3.2.1 VLAN的局限性 ........................................... 8
3.2 valn模型 ................................................. 9
3.2.2 PVLAN类型 ............................................. 9
3.2.3 PVLAN的安全性 ......................................... 9
3.3 VTP管理VLAN ..................................................... 10
3.3.1 VTP的工作模式 ......................................... 10
3.3.2 VTP服务器的配置 ....................................... 10
3.4 交换机设备之间的端口汇聚 ......................................... 10
3.3.1 以太网端口汇聚注意事项 ................................. 11
3.5 启用端口镜像对流量进行监控 ....................................... 11
3.6 构建安全的STP生成树体系 ......................................... 13
下一篇:体育概论总复习资料