


全文预览已结束
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Internet SecurityInternet security is a kind of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. Different methods have been used to protect the transfer of data, including encryption and from-the-ground-up engineering.When computer users face with the problem of Internet Security, a computer user can be tricked or forced into downloading software onto a computer that is of malicious intent. Such software comes in many forms, such as viruses, Trojan horses, spyware, and worms.However, people have realized the network security crisis, Some online sites offer customers the ability to use a six-digit code which randomly changes every 3060 seconds on a security token. The keys on the security token have built in mathematical computations and manipulate numbers based on the current time built into the device. This means that every thirty seconds there is only a certain array of numbers possible which would be correct to validate access to the online account. The website that the user is logging into would be made aware of that devices serial number and would know the computation and correct time built into the device to verify that the number given is indeed one of the handful of six-digit numbers that works in that given 30-60 second cycle. After 3060 seconds the device will present a new random six-digit number which can log into the website, and there are too many firewalls such as Packet filter Stateful packet inspection Application-level gateway Why now the hackers are also overbearing? From my perspective, it is due to the current legal loopholes and the lack of Internet users safety consciousness.I think that the current laws of network security are not strong enough, in my opinion, a network security law, is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment. The document itself is usually several pages long and written by a committee. A security policy goes far beyond the simple idea of keep the bad guys out. Its a very complex document, meant to govern data access, web-browsing habits, use of passwords and encryption, email attachments and more. It specifies these rules for individuals or groups of individuals throughout the company.Security law should keep the malicious users out and also exert control over potential risky users within your organization. The first step in creating a policy is to understand what information and services are available (and to which users), what the potential is for damage and whether any protection is already in place to prevent misuse.In addition, the security law should dictate a hierarchy of access permissions; that is, grant users access only to what is necessary for the completion of their work.While writing the security document can be a major undertaking, a good start can be achieved by using a template. National Institute for Standards and Technology provides a security-policy guideline.The laws could be expressed as a set of instructions that could be understood by special purpose network hardware dedicated for securing the network.The report shows that only 18.36% of respondents, Change the password on a regular basis and the people who when they have a problem they change the password are 64.59% of respondents, 17.05% of respondents never change the password.In teenage days, the junior high school student, James, through self-study hackers technology batching other customers bank cards information and password by means of network attack, he use the loophole of payment to steal others information and make exorbitant profits.In conclusion, it is .high time that we did something to keep information secure. Personally, laws and regulation must be established. Besides to improve technology is anther solution. Meanwhile, we are supposed to rouse the awareness of self-protection. Only in this way can we ensure our rights and interest.ReferencesGralla, Preston (2007). How the Internet Works. Indianapolis: Que Pub. ISBN0-7897-2132-5.Rhee, M. Y. (20
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 陶瓷陶瓷釉面刻划工艺考核试卷及答案
- 毛皮服装机器防蛀工艺考核试卷及答案
- 腈纶纤维预取向预耐氧化处理工艺考核试卷及答案
- 玻璃加工工岗位操作技能考核试卷及答案
- 服务心理学(第四版)课件 项目六 任务一 理解消费认知
- 物业管理公司合伙协议书
- 银行在职招试题及答案
- 银行写作考试试题及答案
- 给水专业试题及答案
- 园林专业考研试题及答案
- 农贸市场装修施工方案
- 2022年广东双百社工笔试真题及答案
- EPLAN电气设计 课件全套 陈乾 任务1-15 初识Eplan、Eplan的安装-图纸设计与电气元件选型练习
- 【拆书阅读笔记】-《网飞文化手册》
- 四川公路工程竣工文件资料编制实施细则
- 提升家庭教育指导能力
- 设备借用协议范本
- 交安工程施工合同
- 高中生物选择性必修一知识点总结
- 肠造口并发症讲稿课件
- GB/T 6403.5-2008砂轮越程槽
评论
0/150
提交评论