XX企业网络安全建议书成都天融信网络安全技术有限公司2004年3月目录总则.................................................................................................................5项目背景....................................................................................................5公司介绍....................................................................................................6第一章网络风险分析...........................................................................71.1物理安全分析.................................................................................71.2链路分析..............................................................................................81.3网络结构的分析...........................................................................81.4系统的安全分析...........................................................................91.5应用系统安全分析.................................................................101.5.1资源共享....................................................................................101.5.2电子邮件....................................................................................101.5.3病毒侵害....................................................................................101.5.4数据信息....................................................................................101.5.5应用系统管理的安全风险分析............................111.6网络安全方案设计原则.....................................................11第二章网络安全需求分析...........................................................122.1物理安全需求..............................................................................122.2防火墙需求....................................................................................122.3入侵检测系统需求.................................................................122.4网络防病毒系统需求...........................................................132.5信息审计需求..............................................................................132.6安全管理需求..............................................................................132.7XX企业安全总体目标...........................................................13第三章网络安全方案........................................................................153.1物理安全实施方案.................................................................153.1.1防盗防火放水...........................................................153.1.2机房环境........................................................................153.1.3物理访问控制方面...............................................153.1.4机房屏蔽........................................................................153.1.5电源系统........................................................................163.1.6传输屏蔽........................................................................163.1.7对终端设备辐射的防范..................................163.2防火墙火墙实施方案...........................................................173.2.1防火墙参数要求.....................................................173.2.2防火墙部署拓扑图1...........................................................193.2.3防火墙部署拓扑图2..................................................193.2.4部署防火墙的好处........................