Discussion on the Construction of Network Security of Yangtze River Scientific Research Institute

LIU Xiang, YANG Jun, WANG Chang, SONG Pu-bin

Journal of Changjiang River Scientific Research Institute ›› 2022, Vol. 39 ›› Issue (3) : 151-154.

PDF(1149 KB)
PDF(1149 KB)
Journal of Changjiang River Scientific Research Institute ›› 2022, Vol. 39 ›› Issue (3) : 151-154. DOI: 10.11988/ckyyb.20210587
INFORMATION TECHNOLOGY APPLICATION

Discussion on the Construction of Network Security of Yangtze River Scientific Research Institute

  • LIU Xiang, YANG Jun, WANG Chang, SONG Pu-bin
Author information +
History +

Abstract

With the development of water conservancy informatization, Yangtze River Scientific Research Institute continues to strengthen internet technology IT application, which brings great convenience to hydro-science research and its management. Notwithstanding its convenience, IT application also raises some security issues with time passing by. At present, to examine each weak link of the network, to improve the overall network security and to avoid network security events have become the focus of work. In line with the actual network and business conditions of Yangtze River Scientific Research Institute, we discussed the content of network security construction of Yangtze River Scientific Research Institute by analyzing its current security risks from three aspects: network boundary, internal network and internal situation awareness. Furthermore, we proposed countermeasures from four aspects of boundary protection, terminal protection, server protection and situational awareness, and expounded the network security technical routes that can be implemented.

Key words

network security / cloud security protection / terminal security / situational awareness / virtual security / Yangtze River Scientific Research Institute

Cite this article

Download Citations
LIU Xiang, YANG Jun, WANG Chang, SONG Pu-bin. Discussion on the Construction of Network Security of Yangtze River Scientific Research Institute[J]. Journal of Changjiang River Scientific Research Institute. 2022, 39(3): 151-154 https://doi.org/10.11988/ckyyb.20210587

References

[1] 习近平. 在中央网络安全和信息化领导小组第一次会议上的讲话[N]. 人民日报,2014-02-28(01).
[2] 周武英. 网络袭击频发 全球网络安全重要性凸显[N]. 经济参考报,2021-06-03(002).
[3] 张 舒,李 淼.2018年度国内外网络空间安全形势回顾[J].信息安全与通信保密,2019(1):32-42.
[4] 张晓玉,陈 河.从SolarWinds事件看软件供应链攻击的特点及影响[J].网信军民融合,2021(4):37-40.
[5] 《保密科学技术》编辑部.2020年网络安全事件盘点之国际篇[J].保密科学技术,2020(12):6-7.
[6] 邓月明.浅谈高校计算机网络安全威胁与防范对策[J].无线互联科技,2016(2):34-36.
[7] 张华志.网站安全云防护方案[J].信息技术与标准化,2018(9):9-12,18.
[8] 周力峰,刘 文,张治中.“长科云”的建设构想与初期探索[J].长江科学院院报,2016,33(12):133-137.
[9] 林云柯,严 瑾.基于云平台的铁路视频系统及安全技术研究[J].铁路通信信号工程技术,2021,18(2):56-61.
[10]谭 韧,殷肖川,廉 哲,等.APT攻击分层表示模型[J].计算机应用,2017,37(9):2551-2556.
[11]孙 健,王 晨.基于行为分析的APT攻击检测研究[J].电子设计工程,2019,27(8):142-146.
[12]王 冠. 基于Spark的APT入侵检测方法研究与实现[D].北京:北京工业大学,2017.
[13]张 滨,袁 捷,乔 喆,等.高级持续性威胁分析与防护[J].电信工程技术与标准化,2018,31(2):48-51.
[14]范可川.网络安全态势感知发展之道[J].中国广播电视学刊,2020(8):36-39.
[15]石乐义,刘 佳,刘祎豪,等.网络安全态势感知研究综述[J].计算机工程与应用,2019,55(24):1-9.
[16]陶 源,黄 涛,张墨涵,等.网络安全态势感知关键技术研究及发展趋势分析[J].信息网络安全,2018(8):79-85.
[17]吴 昊,张瀚之,陈 葭,等.关键信息基础设施安全态势感知平台解决方案[J].信息技术与标准化,2019(9):37-41.
PDF(1149 KB)

Accesses

Citation

Detail

Sections
Recommended

/