China Datang Group Company attaches great importance to information security and has formulated a security strategy of "dual networks, dual computers, sub-zones, hierarchical protection and multi-layer defense&qu...China Datang Group Company attaches great importance to information security and has formulated a security strategy of "dual networks, dual computers, sub-zones, hierarchical protection and multi-layer defense" to strengthen network border security and divide the management information network into an information internal network and an information external network, Logical strong isolation policy is used between information internal and external networks, and information internal and external networks use physical isolation and independent server and desktop computer respectively. According to the transformation of internal and external network isolation in Bikou Power Plant, some problems and solutions of internal and external network isolation in some power enterprises are understood.展开更多
A physical isolation system based on PCI (peripheral component interconnect),embedded with intelligence card technology, strong identity authentication technology and securityaudit, etc., is introduced. The system can...A physical isolation system based on PCI (peripheral component interconnect),embedded with intelligence card technology, strong identity authentication technology and securityaudit, etc., is introduced. The system can physically isolate the internaland external networks. Thehardware of the system, including PCI interface control circuits, network interface circuits andlogic control circuits, is designed to automatically adapt its operation speed and mode to thenetwork and securely isolate the internal and external networks; the software of the system,including the security strategy management module, the security audit module, the database recordexchanging module, the file exchanging module and the mail exchanging module, is designed toefficiently exchange and manage the data transference between the internal and external networks.Also the driver of the system is implemented with Windows driver development kits (DDK) based onNetwork Driver Interface Specification (NDIS). The prototype ofthe system developed has beenemployed in the Police Fire Protection Bureau of Hubei Province, which performs consistently andefficiently. The technological cruxes discussed have practical values for related subjects.展开更多
文摘China Datang Group Company attaches great importance to information security and has formulated a security strategy of "dual networks, dual computers, sub-zones, hierarchical protection and multi-layer defense" to strengthen network border security and divide the management information network into an information internal network and an information external network, Logical strong isolation policy is used between information internal and external networks, and information internal and external networks use physical isolation and independent server and desktop computer respectively. According to the transformation of internal and external network isolation in Bikou Power Plant, some problems and solutions of internal and external network isolation in some power enterprises are understood.
文摘A physical isolation system based on PCI (peripheral component interconnect),embedded with intelligence card technology, strong identity authentication technology and securityaudit, etc., is introduced. The system can physically isolate the internaland external networks. Thehardware of the system, including PCI interface control circuits, network interface circuits andlogic control circuits, is designed to automatically adapt its operation speed and mode to thenetwork and securely isolate the internal and external networks; the software of the system,including the security strategy management module, the security audit module, the database recordexchanging module, the file exchanging module and the mail exchanging module, is designed toefficiently exchange and manage the data transference between the internal and external networks.Also the driver of the system is implemented with Windows driver development kits (DDK) based onNetwork Driver Interface Specification (NDIS). The prototype ofthe system developed has beenemployed in the Police Fire Protection Bureau of Hubei Province, which performs consistently andefficiently. The technological cruxes discussed have practical values for related subjects.