2019
DOI: 10.1007/978-3-030-15235-2_142
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of Enterprise Network Security System Based on Firewall

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Liang Jianhui et al [8] proposed a network security target range based on Docker technology. The range can be used for daily network security learning, competition and simulation environment penetration testing, and is put into use in China Railway Lanzhou Bureau Group Co., LTD.…”
Section: Related Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…Liang Jianhui et al [8] proposed a network security target range based on Docker technology. The range can be used for daily network security learning, competition and simulation environment penetration testing, and is put into use in China Railway Lanzhou Bureau Group Co., LTD.…”
Section: Related Researchmentioning
confidence: 99%
“…Combined with the intelligent Internet of Things system, the targeted establishment of shore power network security protection mode, the innovation of the "Three Gorges Shore Power Range" simulation platform, the operation of equipment to carry out simulated penetration attack, to verify the safety of equipment, ensure the safety and reliability of online facilities, strengthen the management of shore power equipment, fill the gaps in the industry, build a strong shore power system network security shield [7] . Shore power system includes two networks, one is a power supply network, the other is an information network, only these two networks are safe and reliable, in order to better provide users with shore power services, in the daily operation and maintenance work, electric equipment operation and communication equipment operation and maintenance of both indispensable, if the communication equipment is subjected to network attacks, it will seriously cause the damage of ships, shore power equipment and online monitoring failure [8] . May even lead to electric shock accident.…”
Section: Introductionmentioning
confidence: 99%