internet security 网络安全论文.doc_第1页
internet security 网络安全论文.doc_第2页
internet security 网络安全论文.doc_第3页
全文预览已结束

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Internet SecurityInternet security is a kind of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. Different methods have been used to protect the transfer of data, including encryption and from-the-ground-up engineering.When computer users face with the problem of Internet Security, a computer user can be tricked or forced into downloading software onto a computer that is of malicious intent. Such software comes in many forms, such as viruses, Trojan horses, spyware, and worms.However, people have realized the network security crisis, Some online sites offer customers the ability to use a six-digit code which randomly changes every 3060 seconds on a security token. The keys on the security token have built in mathematical computations and manipulate numbers based on the current time built into the device. This means that every thirty seconds there is only a certain array of numbers possible which would be correct to validate access to the online account. The website that the user is logging into would be made aware of that devices serial number and would know the computation and correct time built into the device to verify that the number given is indeed one of the handful of six-digit numbers that works in that given 30-60 second cycle. After 3060 seconds the device will present a new random six-digit number which can log into the website, and there are too many firewalls such as Packet filter Stateful packet inspection Application-level gateway Why now the hackers are also overbearing? From my perspective, it is due to the current legal loopholes and the lack of Internet users safety consciousness.I think that the current laws of network security are not strong enough, in my opinion, a network security law, is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment. The document itself is usually several pages long and written by a committee. A security policy goes far beyond the simple idea of keep the bad guys out. Its a very complex document, meant to govern data access, web-browsing habits, use of passwords and encryption, email attachments and more. It specifies these rules for individuals or groups of individuals throughout the company.Security law should keep the malicious users out and also exert control over potential risky users within your organization. The first step in creating a policy is to understand what information and services are available (and to which users), what the potential is for damage and whether any protection is already in place to prevent misuse.In addition, the security law should dictate a hierarchy of access permissions; that is, grant users access only to what is necessary for the completion of their work.While writing the security document can be a major undertaking, a good start can be achieved by using a template. National Institute for Standards and Technology provides a security-policy guideline.The laws could be expressed as a set of instructions that could be understood by special purpose network hardware dedicated for securing the network.The report shows that only 18.36% of respondents, Change the password on a regular basis and the people who when they have a problem they change the password are 64.59% of respondents, 17.05% of respondents never change the password.In teenage days, the junior high school student, James, through self-study hackers technology batching other customers bank cards information and password by means of network attack, he use the loophole of payment to steal others information and make exorbitant profits.In conclusion, it is .high time that we did something to keep information secure. Personally, laws and regulation must be established. Besides to improve technology is anther solution. Meanwhile, we are supposed to rouse the awareness of self-protection. Only in this way can we ensure our rights and interest.ReferencesGralla, Preston (2007). How the Internet Works. Indianapolis: Que Pub. ISBN0-7897-2132-5.Rhee, M. Y. (20

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论