This paper is concerned about the principle and realization technology of the Security Isolation and Information Exchange Equipment, and discusses some popular Security Isolation and Information Exchange Equipments in the internal market.
A proxy method for some popular IM software is proposed in a security isolation system,in order to make it possible that clients in the protected LANs can communicate with other clients outside the protected LANs.
To meet the need of secure partitioning of the network and secure isolation, a unified supporting platform for the data centre of Shanghai power dispatching automation system is transversely established and an ATM based Shanghai Power Dispatching Network (ShPDnet) and a MSTP based Shanghai Power Telecommunication Network (ShPTnet) is also longitudinally established, the items which should pay attention to during the implementation of security protection are analyzed.
为适应网络安全分区和安全隔离的需要,横向上建立电网调度自动化系统数据中心统一支撑平台,纵向上建设基于异步传输模式 ATM 的上海电力调度数据网(Shanghai Power Dispatching Network,ShPDnet)和基于多业务传输平台 MSTP 的电力数据通信网(Shanghai PowerTelecommunication Network,ShPTnet),并分析了安全防护实施过程中应注意的事项。
2) A multiple-layers network security architecture was designed to avoid the direct physical connection between the inner network and external network, which effectively implements the secure isolation between the two networks.
Deeply analyzes the real situation of computer network in Ningxia electric power system. Based on advanced technology, economic and practical principle, presents the solution scheme according to power supply bureau local dispatch automatic system, the safety isolation of electric energy metering and expensing system and MIS system, power plant network control, DCS system and MIS system safety protection. Set up computer safety protection system in Ningxia power grid.
In view of teaching and on-the-job training,the campus network of Hebei Vocational College of Public Security Police must be linked to special public security net as well as to internet. The article expounds the application of net safety isolation technology to insure the safety of secret information.
The security challenges of XEN are mainly researched from the pointes of view: security bottleneck, security isolation and share, life-cycle, digital copyright protection, trusted virtual machine and managements, etc.