CN207612279U - A kind of food processing factory's network security management system - Google Patents
A kind of food processing factory's network security management system Download PDFInfo
- Publication number
- CN207612279U CN207612279U CN201721424615.2U CN201721424615U CN207612279U CN 207612279 U CN207612279 U CN 207612279U CN 201721424615 U CN201721424615 U CN 201721424615U CN 207612279 U CN207612279 U CN 207612279U
- Authority
- CN
- China
- Prior art keywords
- food processing
- processing factory
- router
- management system
- network security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The utility model discloses a kind of food processing factory's network security management systems, include mainly core switch and router, the router is connect with core switch by firewall module, described router one end connects internet, the firewall module is connected with transponder, the transponder is connected with isolated area, the core switch is connected with multiple LAN modules, the router is connect with firewall module by intrusion detection device, it is provided with web server, ftp server, Mail servers in the isolated area, is connect respectively with transponder;The trouble free service of multiple components such as anti-virus, fire wall, intrusion detection is realized by the Control management system of safety, improves the safety of access control and data, effectively ensures the safety of food processing factory's network system.
Description
Technical field
The utility model is related to network safety fileds, are a kind of food processing factory's network security management systems specifically.
Background technology
As accelerating to for information age is come, people are more and more stronger to the dependence of internet, and appellation people give birth to network
An indispensable part, especially computer technology and the communication technology have been combined the information infrastructure of institute's stroke in work
The most important infrastructure of appellation reaction information social characteristic, with the rapid development of computer networking technology, especially mutually
The one of networking is with more and more extensive, while bringing unprecedented magnanimity information, the opening and free walker of network
Produce private information and possibility that data are destroyed or invade, the safety of Internet becomes more and more important,
Through being paid attention to by the every field of information-intensive society.
In the 21st century, information technology has penetrated into the overall process of production, management and the sale of enterprise, more and more
Bakery and confectionery establishes LAN system, and production is controlled, monitored and managed using computer network, in addition, enterprise
It is flat that financial management, marketing management, equipment management, receiving and dispatching mail, lookup data and information publication etc. all be unable to do without computer network
Platform, it is unprecedented efficiently and quick that computer network is that management, operation and the statistics etc. of food processing factory are brought, but
On network security problem or problematic generation in rapid succession, the LAN of food processing factory can be attacked by hacker or virus
It hits, hacker attacks network system is deleted information, changed or stolen, and computer virus is also interfered and broken to network
Ring, these safety problems there are the main reason for, first, the network protection system imprecision of food processing factory's LAN, network peace
Full consciousness is not strong, second is that the fragility of network system itself and the defect of network security technology, third, network security management system
It spends unsound, prodigious harm is brought to the construction and development of food processing factory's informationization.
Utility model content
The purpose of this utility model is to provide a kind of food processing factory's network security management systems, pass through the control of safety
Management system realizes the trouble free service of anti-virus, fire wall, the multiple components such as detection that network, and can effectively ensure food processing
The safety of factory's network system.
The utility model is achieved through the following technical solutions:A kind of food processing factory's network security management system, it is main to wrap
Core switch and router are included, the router is connect with core switch by firewall module, described router one end
Internet is connected, the firewall module is connected with transponder, and the transponder is connected with isolated area, and the core switch connects
It is connected to multiple LAN modules.
Further is that the utility model is better achieved, and especially uses following setting structures:The router and fire prevention
Wall module is connected by intrusion detection device, and the intrusion detection device includes the safety of detection to intrusion behavior, record, alarm
Management;The intrusion detection device can be measured in real time network system, as the second safety gate after firewall module,
It can be responded when finding intrusion behavior, including the safety measures such as cut-out network, record event, fully extend administrative staff
Safety management ability.
Further is that the utility model is better achieved, and especially uses following setting structures:It is arranged in the isolated area
There are web server, ftp server, Mail servers, is connect respectively with transponder.
Further is that the utility model is better achieved, and especially uses following setting structures:The core switch connects
The multiple LAN modules connect include database manager, authentication manager, data backup device and network manager;Institute
State the permission that authentication manager is test access person, it is ensured that network system is not by unauthorized access;The data backup device
It is connect with database, mainly completes automatic duplicating of data, classification storage and data recovery etc., be to ensure effectively arranging for data safety
It applies.
Further is that the utility model is better achieved, and especially uses following setting structures:The network manager packet
Include core protection module, vulnerability scanning module and anti-virus module.
The following advantages and benefits:
The utility model disposes fire wall between Internet and the LAN of food processing factory so that intranet and extranet are mutual
Isolation, the device intelligence of outer net are accessed the service of opening, have both protected Intranet resource not invaded illegally, while also hindering
Only use of the internal user to external poor sources, and can be to the safety time of generation into line trace and processing.Further
Intrusion detection device is accessed between router and fire wall, it is made to be examined in real time to network as second safety gate
It surveys, and promptly responds, greatly expand the safety management ability of system manager.
The utility model uses the dedicated backup server of food processing factory, connects the storage device of large capacity, Ke Yishi
The measures such as existing automated back-up, data staging storage so that data safety is to be fully ensured.
Description of the drawings
Fig. 1 is the structural schematic diagram of the utility model.
Specific implementation mode
The utility model is described in further detail with reference to embodiment, but the embodiment of the utility model is not
It is limited to this.
It is worth noting that, in the practical application of the utility model, it is inevitably applied to software program, but Shen
Ask someone it is hereby stated that, the software program which is applied in the specific implementation is all the prior art, in this application, no
It is related to the change and protection of software program, only the protection to the hardware structure designed for realization goal of the invention.
Embodiment 1:
Include mainly core switch and router as shown in Figure 1, a kind of food processing factory's network security management system,
The router is connect with core switch by firewall module, and described router one end connects internet, the fire wall
Module is connected with transponder, and the transponder is connected with isolated area, and the core switch is connected with multiple LAN modules.
Embodiment 2:
The present embodiment is further optimized based on the above embodiments, as shown in Figure 1, further is preferably real
Existing the utility model, especially uses following setting structures:The router is connect with firewall module by intrusion detection device, institute
State the safety management that intrusion detection device includes detection to intrusion behavior, record, alarm;The intrusion detection device can be to net
Network system is measured in real time, and as the second safety gate after firewall module, can be responded when finding intrusion behavior,
Including safety measures such as cut-out network, record events, the safety management ability of administrative staff is fully extended.
Embodiment 3:
The present embodiment is further optimized based on the above embodiments, further new for this practicality is better achieved
Type especially uses following setting structures:Web server, ftp server, Mail servers are provided in the isolated area, respectively
It is connect with transponder;Further is that the utility model is better achieved, and especially uses following setting structures:The network management
Device includes core protection module, vulnerability scanning module and anti-virus module.
Embodiment 4:
The present embodiment is further optimized based on the above embodiments, further new for this practicality is better achieved
Type especially uses following setting structures:Multiple LAN modules of the core switch connection include database manager, body
Part certificate manager, data backup device and network manager;The authentication manager is the permission of test access person, really
Network system is protected not by unauthorized access;The data backup device is connect with database, mainly completes automatic duplicating of data, classification
Storage and data recovery etc. are the effective measures for ensureing data safety.
The above is only the preferred embodiment of the utility model, not does limit in any form to the utility model
System, any simple modification made by the above technical examples according to the technical essence of the present invention, equivalent variations, each falls within
Within the scope of protection of the utility model.
Claims (5)
1. a kind of food processing factory's network security management system, it is characterised in that:Include mainly core switch and router, institute
It states router to connect by firewall module with core switch, described router one end connects internet, the fire wall mould
Block is connected with transponder, and the transponder is connected with isolated area, and the core switch is connected with multiple LAN modules.
2. a kind of food processing factory's network security management system according to claim 1, it is characterised in that:The router
It is connect by intrusion detection device with firewall module, the intrusion detection device includes detection, record, the alarm to intrusion behavior
Safety management.
3. a kind of food processing factory's network security management system according to claim 1 or 2, it is characterised in that:It is described every
From web server, ftp server, Mail servers is provided in area, it is connect respectively with transponder.
4. a kind of food processing factory's network security management system according to claim 3, it is characterised in that:The core is handed over
The multiple LAN modules of connection of changing planes include database manager, authentication manager, data backup device and network pipe
Manage device.
5. a kind of food processing factory's network security management system according to claim 4, it is characterised in that:The network pipe
It includes core protection module, vulnerability scanning module and anti-virus module to manage device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201721424615.2U CN207612279U (en) | 2017-10-31 | 2017-10-31 | A kind of food processing factory's network security management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201721424615.2U CN207612279U (en) | 2017-10-31 | 2017-10-31 | A kind of food processing factory's network security management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN207612279U true CN207612279U (en) | 2018-07-13 |
Family
ID=62794667
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201721424615.2U Expired - Fee Related CN207612279U (en) | 2017-10-31 | 2017-10-31 | A kind of food processing factory's network security management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN207612279U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111756766A (en) * | 2020-07-01 | 2020-10-09 | 天津理工大学 | Network information safety protection system |
-
2017
- 2017-10-31 CN CN201721424615.2U patent/CN207612279U/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111756766A (en) * | 2020-07-01 | 2020-10-09 | 天津理工大学 | Network information safety protection system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ashoor et al. | Importance of intrusion detection system (IDS) | |
US6775657B1 (en) | Multilayered intrusion detection system and method | |
Sandhu et al. | A survey of intrusion detection & prevention techniques | |
CN105610874B (en) | A kind of local network safety management system | |
Ramachandran et al. | A P2P intrusion detection system based on mobile agents | |
Herringshaw | Detecting attacks on networks | |
CN107659584A (en) | A kind of food processing factory's network security management system | |
Zhan et al. | Research on block chain network intrusion detection system | |
Beigh et al. | Intrusion detection and prevention system: issues and challenges | |
Mishra et al. | Efficient approaches for intrusion detection in cloud environment | |
Hwoij et al. | SIEM architecture for the Internet of Things and smart city | |
CN207612279U (en) | A kind of food processing factory's network security management system | |
KR20190134287A (en) | security provenance providing system for providing of the root cause of security problems and the method thereof | |
Liu et al. | User behavior identification for trust management in pervasive computing systems | |
Kowalski et al. | Improving Security Through Analysis of Log Files Intersections. | |
Malviya et al. | Improving security by predicting anomaly user through web mining: a review | |
Shengjian et al. | Design of network security early-warning system based on network defense in depth model | |
Ahmad et al. | Hybrid intrusion detection method to increase anomaly detection by using data mining techniques | |
Yi | The Network Security Analysis System Design Based on B/S Structure: An Approach Research | |
Palekar et al. | Complete Study Of Intrusion Detection System | |
Yin | Research and development of intrusion detection technology | |
Chandrakar et al. | A study on intrusion detection system using datamining techniques | |
Zope et al. | Event correlation in network security to reduce false positive | |
Arfaoui et al. | “SOCaaS-IoT” A Security Operations Center as a Service Approach for IoT Applications Using Open-Source SIEM | |
Katata et al. | Distributed agent architecture for intrusion detection based on new metrics |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180713 Termination date: 20181031 |
|
CF01 | Termination of patent right due to non-payment of annual fee |