Unlock instant, AI-driven research and patent intelligence for your innovation.

Hierarchical network security protection integrated linkage defense method

A security protection, layered network technology, applied in secure communication devices, digital transmission systems, electrical components, etc., can solve the problems of not paying attention to talent allocation and training, failing to form a security defense system, and a single form of enterprise network security protection. To achieve the effect of reducing the burden of network traffic and simplifying the difficulty of network protection

Pending Publication Date: 2022-03-15
HUATING COAL GRP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (2) Single form of corporate network security protection
There is no unified planning for network security in the network construction, only a single increase of network security equipment when needed, the enterprise network protection objects and protection methods are "fragmented", various security equipment and defense strategies are not unified, and they fight independently, resulting in The continuous increase of network nodes leads to the waste of network resources, the increase of network bottlenecks, and the difficulty of finding fault points, etc., and it is impossible to form a unified security defense system, which has not significantly improved network security management and prevention.
[0006] (3) The lack of high-quality network security management personnel "shackles" the network security of enterprises
Often, most coal enterprises focus on equipment and do not pay attention to the allocation and training of talents. The main manifestations are: network management personnel are not professionals in network security and information technology, and the lack of professional knowledge makes it difficult to manage network security; Security management workers only focus on the network security work within the enterprise, and it is difficult to meet the needs of compound network management technicians in the current network security work; they do not pay enough attention to network security issues, change policies at will, and relax permissions, causing management problems. Missing, ineffective management and other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hierarchical network security protection integrated linkage defense method
  • Hierarchical network security protection integrated linkage defense method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention.

[0025] refer to Figure 1-2 , an integrated linkage defense method for layered network security protection, comprising the following steps:

[0026] S1: By analyzing the network security situation of coal mine enterprises, the technical principles of boundary protection, terminal protection, and integrated comprehensive defense are proposed, the internal and external networks are physically isolated and divided, and different levels of security domains are divided according to the importance of unreachable areas. Targeted security protection;

[0027] S2: According to the region, enterprise network boundary protection can be divided into Internet boundary, internal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hierarchical network security protection integrated linkage defense method, which comprises the following steps of: by analyzing the network security situation of a coal mine enterprise, proposing a technical principle of boundary protection, terminal protection and integrated comprehensive defense, physically isolating internal and external networks and dividing regions, and according to the importance of different regions, different levels of security domains are divided, and security protection is performed in a targeted manner. According to the method, internal and external network physical isolation and region division are performed, different levels of security domains are divided according to the importance of different regions, and security protection is performed in a targeted manner. The network protection difficulty is simplified, and the network traffic burden is relieved.

Description

technical field [0001] The invention relates to the technical field of network security protection, in particular to an integrated linkage defense method for layered network security protection. Background technique [0002] The traditional network security architecture is divided into partitions, domains, and boundaries to place security devices. This is often "independent", making it difficult to share data and cannot form an in-depth linkage defense. Nowadays, in the face of complex, targeted and purposeful cyber threats, we need to open up the information sharing of these security devices as soon as possible, gather these security data, and build a threat intelligence library based on big data. In addition, the traditional defense technology uses database data comparison, that is, to find threats by comparing them with viruses and threats that have appeared in the past. This defense technology is often relatively passive. Nowadays, we not only need to compare with the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40
CPCH04L63/02H04L63/1408H04L63/1416H04L63/1433H04L63/1441H04L63/20
Inventor 滕敬云郭旭东朱奎铭张艳马伟尚敏柳显峰王建伟田苏斌赵杏兰峰涛杜成林田雪莉麻赟
Owner HUATING COAL GRP