A STUDY ON LAN SECURITY DEFENCE MODEL

碩士 === 國防管理學院 === 國防資訊研究所 === 93 === As network era and network economic developing, there are many activities, such as: economic, culture, military and social, would strongly depend on network operations. When computer network applications are more required in the daily life, the information and ne...

Full description

Bibliographic Details
Main Authors: Ha Jih-sheng, 哈繼昇
Other Authors: Fu Chen-Hua
Format: Others
Language:zh-TW
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/36694105682437114785
Description
Summary:碩士 === 國防管理學院 === 國防資訊研究所 === 93 === As network era and network economic developing, there are many activities, such as: economic, culture, military and social, would strongly depend on network operations. When computer network applications are more required in the daily life, the information and network security issues should be more be valued. Since new network attacks keep emerging, computer hardware, system software, applications and users information over networks would be maliciously attacked. A safe network operation environment might not be supported by old network security schemes. Moreover, it is easy for information transmission over a network to be eavesdropped, intercepted, modified or fabricated. This shows information systems over networks and their data are in an easily attacked situation. It is necessary to adopt proper protection measures to support network security. Many proposed information system security models did not consider a dynamic network environment; they did not have available measures to defense the attacks from dynamic network threats. Therefore, they could not satisfy network operation security requirements for most enterprises and organizations. For considering possible security issues over LANs, this study proposes a general LAN security defense model. In the proposed model, several concrete network security dimensions should be focused by enterprises and organizations to achieve their required network security goals. Moreover, for understanding the usability of the proposed model, this study also uses ISO17799 to examine the proposed model.