Abstract
Nowadays, the electronic power industry is improving the level of information, and the data security of the internal network is arousing more and more attention. The domestic units and enterprises implemented relatively comprehensively. Most of them deployed firewall, intrusion detection and vulnerability scanning systems which allow them to reduce the risk of network boundaries greatly. However, as to the network terminal management within the network of the enterprise, the current risk prevention measures are far from enough because the internal network security issues come out easily. Combined with the extensive practical application of the electric power enterprise, this paper puts forward the secure desktop idea so as to solve the terminal security of the internal network computers. This measure can achieve the aim of a further control of the terminal security of the internal network computers. Thereby, it realizes a better controlled data security within the internal network and provides a good security network solution of the protection with the electric power business.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhang, S., Liu, W., Yang, S.M.: Discuss about the green protection strategy of enterprise internal network. Electr. Power Inf. Technol. 3–8 (2008)
Pan, Z.Y., Pan, J.Y.: Analysis on internal network safety threat and prevention. Ordnance Ind. Autom. (2008)
Pan, Y.X.: The actuality and development trend of desktop security management technology. Inf. secur. Technol. (2010)
Hu, W., Zhang, C.H., Liao, W.: Security management function design of computer security defence system. Comput. Engine. Des. 5–30 (2010)
Liu, H.Y.: Research and design of security support model in the intranet. Mod. Electron. Tech. 3–20 (2007)
Cabuk, S., Dalton, C.I., Eriksson, K., Kuhlmann, D., Ramasamy, H.V., Ramunno, G., Sadeghi, A-R., Schunter, M., Stüble, C.: Towards automated security policy enforcement in multi-tenant virtual data centers. J. Comput. Secur. 18(1), 80–121 (2010)
Berger, S., Caceres, R., Pendarakis, D.E., Sailer, R., Valdez, E., Perez, R., Schildhauer, W., Srinivasan, D.: Managing security in the trusted virtual datacenter. Oper. Syst. Rev. 42(1), 40–47 (2008)
Catuogno, L., Dmitrienko, A., Eriksson, K., Kuhlmann, D., Sadeghi, A.-R., Schulz, S., Schunter, M., Winandy, M., Zhan, J.: Trusted virtual domains—design, implementation and lessons learned. In: International Conference on Trusted Systems. Spring (2009)
Adeyinka, O.: Internet attack methods and internet security technology. In: Second Asia international conference on modeling and simulation, 2008, AICMS 08, pp. 13–82 (2008)
Kartalopoulos, S.V.: Differentiating data security and network security. IEEE international conference on communications, 2008, ICC’08, pp. 1469–1473 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Liao, Y., Li, XT. (2013). The Implementation with the Network Data Security on the Secure Desktop. In: Wong, W.E., Ma, T. (eds) Emerging Technologies for Information Systems, Computing, and Management. Lecture Notes in Electrical Engineering, vol 236. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7010-6_90
Download citation
DOI: https://doi.org/10.1007/978-1-4614-7010-6_90
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-7009-0
Online ISBN: 978-1-4614-7010-6
eBook Packages: EngineeringEngineering (R0)