CN207612279U - A kind of food processing factory's network security management system - Google Patents

A kind of food processing factory's network security management system Download PDF

Info

Publication number
CN207612279U
CN207612279U CN201721424615.2U CN201721424615U CN207612279U CN 207612279 U CN207612279 U CN 207612279U CN 201721424615 U CN201721424615 U CN 201721424615U CN 207612279 U CN207612279 U CN 207612279U
Authority
CN
China
Prior art keywords
food processing
processing factory
router
management system
network security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201721424615.2U
Other languages
Chinese (zh)
Inventor
陈长清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Tengfei Tengfei Information Technology Co Ltd
Original Assignee
Sichuan Tengfei Tengfei Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Tengfei Tengfei Information Technology Co Ltd filed Critical Sichuan Tengfei Tengfei Information Technology Co Ltd
Priority to CN201721424615.2U priority Critical patent/CN207612279U/en
Application granted granted Critical
Publication of CN207612279U publication Critical patent/CN207612279U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The utility model discloses a kind of food processing factory's network security management systems, include mainly core switch and router, the router is connect with core switch by firewall module, described router one end connects internet, the firewall module is connected with transponder, the transponder is connected with isolated area, the core switch is connected with multiple LAN modules, the router is connect with firewall module by intrusion detection device, it is provided with web server, ftp server, Mail servers in the isolated area, is connect respectively with transponder;The trouble free service of multiple components such as anti-virus, fire wall, intrusion detection is realized by the Control management system of safety, improves the safety of access control and data, effectively ensures the safety of food processing factory's network system.

Description

A kind of food processing factory's network security management system
Technical field
The utility model is related to network safety fileds, are a kind of food processing factory's network security management systems specifically.
Background technology
As accelerating to for information age is come, people are more and more stronger to the dependence of internet, and appellation people give birth to network An indispensable part, especially computer technology and the communication technology have been combined the information infrastructure of institute's stroke in work The most important infrastructure of appellation reaction information social characteristic, with the rapid development of computer networking technology, especially mutually The one of networking is with more and more extensive, while bringing unprecedented magnanimity information, the opening and free walker of network Produce private information and possibility that data are destroyed or invade, the safety of Internet becomes more and more important, Through being paid attention to by the every field of information-intensive society.
In the 21st century, information technology has penetrated into the overall process of production, management and the sale of enterprise, more and more Bakery and confectionery establishes LAN system, and production is controlled, monitored and managed using computer network, in addition, enterprise It is flat that financial management, marketing management, equipment management, receiving and dispatching mail, lookup data and information publication etc. all be unable to do without computer network Platform, it is unprecedented efficiently and quick that computer network is that management, operation and the statistics etc. of food processing factory are brought, but On network security problem or problematic generation in rapid succession, the LAN of food processing factory can be attacked by hacker or virus It hits, hacker attacks network system is deleted information, changed or stolen, and computer virus is also interfered and broken to network Ring, these safety problems there are the main reason for, first, the network protection system imprecision of food processing factory's LAN, network peace Full consciousness is not strong, second is that the fragility of network system itself and the defect of network security technology, third, network security management system It spends unsound, prodigious harm is brought to the construction and development of food processing factory's informationization.
Utility model content
The purpose of this utility model is to provide a kind of food processing factory's network security management systems, pass through the control of safety Management system realizes the trouble free service of anti-virus, fire wall, the multiple components such as detection that network, and can effectively ensure food processing The safety of factory's network system.
The utility model is achieved through the following technical solutions:A kind of food processing factory's network security management system, it is main to wrap Core switch and router are included, the router is connect with core switch by firewall module, described router one end Internet is connected, the firewall module is connected with transponder, and the transponder is connected with isolated area, and the core switch connects It is connected to multiple LAN modules.
Further is that the utility model is better achieved, and especially uses following setting structures:The router and fire prevention Wall module is connected by intrusion detection device, and the intrusion detection device includes the safety of detection to intrusion behavior, record, alarm Management;The intrusion detection device can be measured in real time network system, as the second safety gate after firewall module, It can be responded when finding intrusion behavior, including the safety measures such as cut-out network, record event, fully extend administrative staff Safety management ability.
Further is that the utility model is better achieved, and especially uses following setting structures:It is arranged in the isolated area There are web server, ftp server, Mail servers, is connect respectively with transponder.
Further is that the utility model is better achieved, and especially uses following setting structures:The core switch connects The multiple LAN modules connect include database manager, authentication manager, data backup device and network manager;Institute State the permission that authentication manager is test access person, it is ensured that network system is not by unauthorized access;The data backup device It is connect with database, mainly completes automatic duplicating of data, classification storage and data recovery etc., be to ensure effectively arranging for data safety It applies.
Further is that the utility model is better achieved, and especially uses following setting structures:The network manager packet Include core protection module, vulnerability scanning module and anti-virus module.
The following advantages and benefits:
The utility model disposes fire wall between Internet and the LAN of food processing factory so that intranet and extranet are mutual Isolation, the device intelligence of outer net are accessed the service of opening, have both protected Intranet resource not invaded illegally, while also hindering Only use of the internal user to external poor sources, and can be to the safety time of generation into line trace and processing.Further Intrusion detection device is accessed between router and fire wall, it is made to be examined in real time to network as second safety gate It surveys, and promptly responds, greatly expand the safety management ability of system manager.
The utility model uses the dedicated backup server of food processing factory, connects the storage device of large capacity, Ke Yishi The measures such as existing automated back-up, data staging storage so that data safety is to be fully ensured.
Description of the drawings
Fig. 1 is the structural schematic diagram of the utility model.
Specific implementation mode
The utility model is described in further detail with reference to embodiment, but the embodiment of the utility model is not It is limited to this.
It is worth noting that, in the practical application of the utility model, it is inevitably applied to software program, but Shen Ask someone it is hereby stated that, the software program which is applied in the specific implementation is all the prior art, in this application, no It is related to the change and protection of software program, only the protection to the hardware structure designed for realization goal of the invention.
Embodiment 1:
Include mainly core switch and router as shown in Figure 1, a kind of food processing factory's network security management system, The router is connect with core switch by firewall module, and described router one end connects internet, the fire wall Module is connected with transponder, and the transponder is connected with isolated area, and the core switch is connected with multiple LAN modules.
Embodiment 2:
The present embodiment is further optimized based on the above embodiments, as shown in Figure 1, further is preferably real Existing the utility model, especially uses following setting structures:The router is connect with firewall module by intrusion detection device, institute State the safety management that intrusion detection device includes detection to intrusion behavior, record, alarm;The intrusion detection device can be to net Network system is measured in real time, and as the second safety gate after firewall module, can be responded when finding intrusion behavior, Including safety measures such as cut-out network, record events, the safety management ability of administrative staff is fully extended.
Embodiment 3:
The present embodiment is further optimized based on the above embodiments, further new for this practicality is better achieved Type especially uses following setting structures:Web server, ftp server, Mail servers are provided in the isolated area, respectively It is connect with transponder;Further is that the utility model is better achieved, and especially uses following setting structures:The network management Device includes core protection module, vulnerability scanning module and anti-virus module.
Embodiment 4:
The present embodiment is further optimized based on the above embodiments, further new for this practicality is better achieved Type especially uses following setting structures:Multiple LAN modules of the core switch connection include database manager, body Part certificate manager, data backup device and network manager;The authentication manager is the permission of test access person, really Network system is protected not by unauthorized access;The data backup device is connect with database, mainly completes automatic duplicating of data, classification Storage and data recovery etc. are the effective measures for ensureing data safety.
The above is only the preferred embodiment of the utility model, not does limit in any form to the utility model System, any simple modification made by the above technical examples according to the technical essence of the present invention, equivalent variations, each falls within Within the scope of protection of the utility model.

Claims (5)

1. a kind of food processing factory's network security management system, it is characterised in that:Include mainly core switch and router, institute It states router to connect by firewall module with core switch, described router one end connects internet, the fire wall mould Block is connected with transponder, and the transponder is connected with isolated area, and the core switch is connected with multiple LAN modules.
2. a kind of food processing factory's network security management system according to claim 1, it is characterised in that:The router It is connect by intrusion detection device with firewall module, the intrusion detection device includes detection, record, the alarm to intrusion behavior Safety management.
3. a kind of food processing factory's network security management system according to claim 1 or 2, it is characterised in that:It is described every From web server, ftp server, Mail servers is provided in area, it is connect respectively with transponder.
4. a kind of food processing factory's network security management system according to claim 3, it is characterised in that:The core is handed over The multiple LAN modules of connection of changing planes include database manager, authentication manager, data backup device and network pipe Manage device.
5. a kind of food processing factory's network security management system according to claim 4, it is characterised in that:The network pipe It includes core protection module, vulnerability scanning module and anti-virus module to manage device.
CN201721424615.2U 2017-10-31 2017-10-31 A kind of food processing factory's network security management system Expired - Fee Related CN207612279U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201721424615.2U CN207612279U (en) 2017-10-31 2017-10-31 A kind of food processing factory's network security management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201721424615.2U CN207612279U (en) 2017-10-31 2017-10-31 A kind of food processing factory's network security management system

Publications (1)

Publication Number Publication Date
CN207612279U true CN207612279U (en) 2018-07-13

Family

ID=62794667

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201721424615.2U Expired - Fee Related CN207612279U (en) 2017-10-31 2017-10-31 A kind of food processing factory's network security management system

Country Status (1)

Country Link
CN (1) CN207612279U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111756766A (en) * 2020-07-01 2020-10-09 天津理工大学 Network information safety protection system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111756766A (en) * 2020-07-01 2020-10-09 天津理工大学 Network information safety protection system

Similar Documents

Publication Publication Date Title
Ashoor et al. Importance of intrusion detection system (IDS)
US6775657B1 (en) Multilayered intrusion detection system and method
Sandhu et al. A survey of intrusion detection & prevention techniques
CN105610874B (en) A kind of local network safety management system
Ramachandran et al. A P2P intrusion detection system based on mobile agents
Herringshaw Detecting attacks on networks
CN107659584A (en) A kind of food processing factory's network security management system
Zhan et al. Research on block chain network intrusion detection system
Beigh et al. Intrusion detection and prevention system: issues and challenges
Mishra et al. Efficient approaches for intrusion detection in cloud environment
Hwoij et al. SIEM architecture for the Internet of Things and smart city
CN207612279U (en) A kind of food processing factory's network security management system
KR20190134287A (en) security provenance providing system for providing of the root cause of security problems and the method thereof
Liu et al. User behavior identification for trust management in pervasive computing systems
Kowalski et al. Improving Security Through Analysis of Log Files Intersections.
Malviya et al. Improving security by predicting anomaly user through web mining: a review
Shengjian et al. Design of network security early-warning system based on network defense in depth model
Ahmad et al. Hybrid intrusion detection method to increase anomaly detection by using data mining techniques
Yi The Network Security Analysis System Design Based on B/S Structure: An Approach Research
Palekar et al. Complete Study Of Intrusion Detection System
Yin Research and development of intrusion detection technology
Chandrakar et al. A study on intrusion detection system using datamining techniques
Zope et al. Event correlation in network security to reduce false positive
Arfaoui et al. “SOCaaS-IoT” A Security Operations Center as a Service Approach for IoT Applications Using Open-Source SIEM
Katata et al. Distributed agent architecture for intrusion detection based on new metrics

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180713

Termination date: 20181031

CF01 Termination of patent right due to non-payment of annual fee