Building an unbreakable Campus network security system

Source: Internet
Author: User

The development of network technology has greatly changed the way people live and work, the Internet has brought endless convenience to people. However, while we marvel at the powerful function of the network, we should also soberly see that the network world is not safe. The U.S. Federal Bureau of Statistics, the United States each year due to network security problems caused by economic losses as high as 7.5 billion U.S. dollars, and the global average every 20 seconds of an Internet computer intrusion event. In our country, every year because of hacker intrusion, computer virus damage to the enterprise caused by shocking loss. People enjoy the superiority of the network at the same time, the network security issues become more and more attention. As a university, how to build a relatively reliable campus network security system has become more and more prominent.

Generally speaking, constructing the campus network security system should start from two aspects: one is to adopt certain technology, and the other is to continuously improve the management method.

From the technical point of view, the current common security methods are internal and external network isolation technology, encryption technology, identity authentication, access control, secure routing, and so on, these technologies to prevent the illegal intrusion system played a certain defensive role. As a kind of technology, the firewall is widely used in the construction of campus network security.

Network status

The University of Finance and Economics is a comprehensive university which is oriented to the whole country, with economics and management as the main, law, literature and other disciplines supporting each other and coordinating development. The campus network of the University has established a computer information network for the whole school education and scientific research, realized the computer networking in the campus, shared information resources and connected with the Internet through the Chinese educational and scientific research networks (CERNET), and its service object is mainly the teaching, scientific research and Administration Unit in the school. The original campus network structure is: The campus connection between the choice of multimode fiber, to the audio-visual building as the center, radiation to other buildings, the horizontal cable in the building using Super five-type non-screen twisted cable. The Cisco Catalyst8540 13-Slot Multi-service routing switch serves as the central switch, and the level two switch is Cisco Catalyst 5505 and Cisco Catalyst 2924.

Security risks

At that time, the campus network security problems and vulnerabilities are:

1, the campus network through cernet and the Internet, in the enjoyment of the Internet convenient and fast, but also faced with the risk of attack.

2, the campus network also has a lot of security risks, because the internal users of the network structure and application models are more understanding, so from the internal security threat is greater. Now, hacking tools are rampant on the internet, and the psychological characteristics of individual students determine their likelihood of using these tools to attack.

3. The operating system currently in use has security vulnerabilities and poses a threat to network security. The network server of Central University of Finance and Economics installs the operating system to have windowsnt/windows2000, Unix, Linux and so on, these system security risk level is different, for instance winnt/ WIN2000 's universality and operability make it also the most insecure system: its own system vulnerabilities, browser vulnerabilities, IIS vulnerabilities, and UNIX because of its technical complexity led to advanced hackers to attack it: its own security vulnerabilities (RIP route transfer, etc.), service security vulnerabilities, Unix's own viruses, and so on, all of which pose a threat to the existing network security.

4, with the campus computer application of a wide range of popularization, access to campus network nodes increasingly, and most of these nodes did not take a certain measure of protection, at any time may cause virus flooding, information loss, data corruption, network attack, system paralysis and other serious consequences.

Therefore, it is very important to construct an effective network security mechanism with the necessary information security protection system.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.