Abstract

With the rapid development of science and technology in modern society, enterprises are developing in the direction of more openness, standardization and network interconnection. Although enterprises have realized the informationization of production and operation earlier, their network information security architecture is still not perfect, and the existing network information security model cannot be fully applied to some enterprises, which has made some enterprises unable to fully protect their network information security. Therefore, there is an urgent need for a more targeted network security model for enterprises to enhance the security strength of their network information systems. Based on the analysis of the security situation of the enterprise network information system, this thesis combines the security status of the enterprise information system and the main threats to construct a cloud computing-based enterprise network security model. This model is a classic network security model of dynamic closed-loop management consisting of four modules: protection, detection, response and recovery. On this basis, a risk-hardening security hardening scheme is designed and implemented, and the practicability and effectiveness of the improved enterprise network security model are verified. The research in this thesis proves that the improved enterprise network security model can make domestic companies ‘network information systems more robust, and also provides a reference basis for the construction of other small and medium-sized enterprises’ network information systems. Instead, it is developing in the direction of combining technical and management methods to effectively improve the level of enterprise network information security.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.