首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 500 毫秒
1.
本文主要讨论了利用防火墙技术构筑VPN over DSL,实现高效、安全的企业级虚拟专业网络,着重讨论了防火墙技术中关键的安全标准Ipsec。  相似文献   

2.
通过对局域网防火墙的设计和研究,实现一种基于包过滤控制技术的防火墙,利用发起网络通信的IP地址、TCP/UDP端口号、协议种类等特征对网络中的数据包进行监控,其中防火墙上的过滤控制规则由管理员统一设置。通过对包过滤技术进行定义,并对防火墙包过滤控制规则的形式化描述进行了定义,然后给出了防火墙的逻辑结构、主要数据结构和重要功能模块的实现叙述。  相似文献   

3.
一、防火墙的概念、作用及分类 (一)防火墙的概念 防火墙是实现安全的一种方法,它制定了一个较大范围的安全策略来定义所允许的服务和访问。从网络配置的角度来说,防火墙是这种安全策略的一个具体实现,包括一个或多个主机、多台路由器,及其它安全手段,如用户认证技术。  相似文献   

4.
防火墙是目前实现网络安全最有效的手段。防火墙通过强制实施统一的安全策略 ,防止对重要信息资源的非法存取和访问 ,以达到保护系统安全的目的。本文重点介绍了防火墙的主要技术特点及发展趋势。  相似文献   

5.
信息时代 ,个人上网机的信息保护越来越受到社会的重视 ,个人防火墙就应运而生。首先简单介绍个人防火墙的原理和功能 ,在特殊IP的过滤和端口、漏洞和进程防护几个方面分析了当前一些典型的个人防火墙产品存在的缺点 ,提出了EPFW的概念 ,然后阐述了EPFW对个人防火墙的IP过滤、端口防护、漏洞防护、病毒防护和进程防护进行增强的设计问题、技术难点以及解决方法。这些都说明对于PC机信息保护而言 ,EPFW是一个可行的合理的解决方案。  相似文献   

6.
概述我国古建筑火灾情况,介绍古建筑的防火技术,着重分析正吻、防火墙、防火间距等的作用.  相似文献   

7.
本文以个人防火墙为主题,介绍了因特网的防火墙基本概念、原理、类型及特点。  相似文献   

8.
简述了防火墙的相关技术理论,并在理论基础上提出一种设计构想,对其设计思想、安全策略的制定和实施进行了阐述。  相似文献   

9.
随着 INTERNET 的快速发展,网络安全问题也日益严重,防火墙、入侵检测系统等网络安全技术得到广泛应用。蜜罐的出现,提供了一种新的主动型的网络安全防护技术。本文介绍了蜜罐的定义、分类以及安全性和应用。  相似文献   

10.
入侵检测系统是继防火墙之后的第二道网络安全防线。讨论了现有入侵检测技术 ,分析了该技术存在的问题 ,介绍了几种能较好解决这些问题的智能入侵检测新技术。  相似文献   

11.
以菏泽市构筑社会消防安全"防火墙"工程为例,分析构建社会消防安全"防火墙"工程所面临的问题,提出构建社会消防安全"防火墙"工程的对策,创新消防安全管理,筑牢消防安全群防群治基础,推进消防安全"防火墙"工程建设,全面提升城乡防控火灾的能力,确保火灾形势持续稳定,为全市经济更好更快发展提供良好的消防安全保障。  相似文献   

12.
确保社会单位建筑消防设施的完好有效,直接关系到建筑物整体的防灾、抗灾的能力,也是筑牢社会单位"防火墙"工程的基本保障之一。剖析了社会单位建筑消防设施的现状,分析存在的问题,并就加强建筑消防设施的日常管理提出了几点设想和建议。  相似文献   

13.
一种基于联动的军队网络安全防护体系   总被引:1,自引:0,他引:1  
网络是军队信息化建设的基础,安全是军队信息化建设的保障。通过分析当前军队网络安全方面所存在的隐患以及防护措施的不足,引入一种基于联动技术的网络安全防护体系。该体系以防火墙为核心,以安全通信协议为基础框架,以PKI/CA体系为安全支撑,能够从整体上对军队网络进行全方位、立体的防护。其逻辑构成为核心安全设备、外围安全设备和安全通信协议3个部分,各种外围安全设备通过不同的安全通信协议如LD- BP、LCSP、ASIP等与核心安全设备(防火墙)进行有机联动,整个体系的安全性可以满足军队对网络安全的要求。  相似文献   

14.
Indonesia, Thailand, and Vietnam recently announced that they are launching nuclear energy programs, and Malaysia and the Philippines soon may follow suit. As a result, by 2020, at least three states in Southeast Asia could possess latent nuclear capabilities—the option to pursue military applications of dual-use nuclear technology. Analysis of the nuclear programs, domestic proliferation pressures, and the external threat environment in Southeast Asia leads the authors to conclude that the nuclear intentions of states in that region are entirely peaceful and the probability of future nuclear breakout there is low. However, this finding does not justify complacency. In the long term, the benign outlook for regional security may change, and in the near term weak regulatory regimes present serious challenges to nuclear safety and create opportunities that non-state actors may exploit. To minimize these risks, the authors recommend creating a “proliferation firewall” around the region, which would combine strong global support for Southeast Asian nuclear energy programs with innovative regional multilateral nuclear arrangements.  相似文献   

15.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

16.
NATO burden sharing has become an especially timely issue in the past several years as a result of a number of factors, including Russian annexation of Crimea and destabilization of eastern Ukraine in 2014. This article argues that alliance unity among the great democracies of Europe and North America is indispensable to peace and stability on the Eurasian continent. A fractured NATO, and especially, a large divide in purposes or commitments as between the United States and its European security partners, invites aggression and the possibility of inadvertent escalation. Past successes and failures in US-involved multinational peace and stability operations, within and outside of Europe, show that mission accomplishment requires give and take, including the occasional acceptance of unequal costs and benefits among the members, in order to achieve peace and security objectives.  相似文献   

17.
The lessons from the two French counterinsurgencies, Indochina and Algeria, give rise to a new understanding of the projection of airpower in remote and hostile environments and the purpose, design, and use of aircraft in counterinsurgency. In both Indochina and Algeria, the campaigns were ones of poverty, and it is their imaginative management under severe resource constraints that provides thoughtful and applicable lessons for today. In both cases, airpower held the promise of delivering victory and solving the resource issue. In Indochina, acquisition of the needed aircraft, operating knowledge, and experience came too slowly to realize this promise. In Algeria, the French embraced the lessons from Indochina and were quite successful and innovative in the use of airpower. The lessons can be reduced to four requirements: (1) a network of airfields for liaison, ground-support, and intra-theater airlift to enable effective air support of ground forces; (2) a solid, reliable, and simple ground-support aircraft capable of operating from forward airfields within range of ground engagements; (3) a capable intra-theater heavy-lift transport to supply the extended ground forces; and (4) helicopter capability to enhance tactical troop mobility and support.  相似文献   

18.
低慢小无人机具有小型化、红外与雷达暴露征候小、飞行高度低、飞行轨迹不定以及购买使用几乎无门槛等特征,给当前全球军事区域和军事行动安全带来了新的挑战。本文首先分析了世界主要国家对低慢小无人机的界定、国内外管控情况和相关威胁事件;然后,从低慢小无人机的侦察袭击能力、军事区域现有安防措施和低慢小无人机对军事区域进行侦察的相关案例入手,讨论了低慢小无人机对军事区域的侦察袭击的威胁;最后从政策制度、营区部署与隐蔽伪装以及反制措施配置三方面对军事区域防低慢小无人机侦察袭击的手段与措施进行了分析和研究,重点就机动性、经济性、技术难度、可操作性、反应速度、打击效果、能否对抗集群目标以及适用场合等方面对当前各种反无人机的干扰、驱离、毁坏措施进行了对比。  相似文献   

19.
虚拟样机在装备性能仿真和评估中的应用   总被引:1,自引:0,他引:1  
说明了机械系统动力学研究的必要性 ,阐述了虚拟样机的特点。在分析火炮后坐部分的主要受力的基础上 ,首次将 ADAMS应用到武器装备研究领域 ,结合 Fortran语言编程 ,在 ADAMS平台上建立了火炮虚拟样机。在此基础上 ,将虚拟样机仿真方法和传统建模方法进行了对比 ,克服了火炮传统建模方法中“对称、平面、静平衡”假设的缺陷 ,进一步证明了将ADAMS引入武器装备领域仿真研究的可行性。最后 ,提出了火炮动态性能分级评估方案 ,定义了故障评判函数的概念 ,并对虚拟样机的应用前景进行了展望。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号