


全文预览已结束
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Internet SecurityInternet security is a kind of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. Different methods have been used to protect the transfer of data, including encryption and from-the-ground-up engineering.When computer users face with the problem of Internet Security, a computer user can be tricked or forced into downloading software onto a computer that is of malicious intent. Such software comes in many forms, such as viruses, Trojan horses, spyware, and worms.However, people have realized the network security crisis, Some online sites offer customers the ability to use a six-digit code which randomly changes every 3060 seconds on a security token. The keys on the security token have built in mathematical computations and manipulate numbers based on the current time built into the device. This means that every thirty seconds there is only a certain array of numbers possible which would be correct to validate access to the online account. The website that the user is logging into would be made aware of that devices serial number and would know the computation and correct time built into the device to verify that the number given is indeed one of the handful of six-digit numbers that works in that given 30-60 second cycle. After 3060 seconds the device will present a new random six-digit number which can log into the website, and there are too many firewalls such as Packet filter Stateful packet inspection Application-level gateway Why now the hackers are also overbearing? From my perspective, it is due to the current legal loopholes and the lack of Internet users safety consciousness.I think that the current laws of network security are not strong enough, in my opinion, a network security law, is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment. The document itself is usually several pages long and written by a committee. A security policy goes far beyond the simple idea of keep the bad guys out. Its a very complex document, meant to govern data access, web-browsing habits, use of passwords and encryption, email attachments and more. It specifies these rules for individuals or groups of individuals throughout the company.Security law should keep the malicious users out and also exert control over potential risky users within your organization. The first step in creating a policy is to understand what information and services are available (and to which users), what the potential is for damage and whether any protection is already in place to prevent misuse.In addition, the security law should dictate a hierarchy of access permissions; that is, grant users access only to what is necessary for the completion of their work.While writing the security document can be a major undertaking, a good start can be achieved by using a template. National Institute for Standards and Technology provides a security-policy guideline.The laws could be expressed as a set of instructions that could be understood by special purpose network hardware dedicated for securing the network.The report shows that only 18.36% of respondents, Change the password on a regular basis and the people who when they have a problem they change the password are 64.59% of respondents, 17.05% of respondents never change the password.In teenage days, the junior high school student, James, through self-study hackers technology batching other customers bank cards information and password by means of network attack, he use the loophole of payment to steal others information and make exorbitant profits.In conclusion, it is .high time that we did something to keep information secure. Personally, laws and regulation must be established. Besides to improve technology is anther solution. Meanwhile, we are supposed to rouse the awareness of self-protection. Only in this way can we ensure our rights and interest.ReferencesGralla, Preston (2007). How the Internet Works. Indianapolis: Que Pub. ISBN0-7897-2132-5.Rhee, M. Y. (20
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025三明市三元区列西街道社区工作者考试真题
- 四川省苍溪中学2024-2025学年高二下学期4月第一学段考试历史试题(原卷版)
- 2025年项目部管理人员安全培训考试试题答案完整
- 2024-2025公司、项目部、各个班组三级安全培训考试试题及一套参考答案
- 2025公司及项目部安全培训考试试题及答案黄金题型
- 2024-2025工厂职工安全培训考试试题及答案审定
- 2025项目部管理人员安全培训考试试题【预热题】
- 25年企业安全管理人员安全培训考试试题【考点梳理】
- 2025管理人员岗前安全培训考试试题及参考答案(突破训练)
- 2025公司安全管理人员安全培训考试试题及完整答案1套
- 2024年四川省南充市中考生物试卷真题(含官方答案)
- 劳动教育智慧树知到期末考试答案章节答案2024年华中师范大学
- 成人高尿酸血症与痛风食养指南(2024年版)
- 2024年首都机场集团招聘笔试参考题库附带答案详解
- 2023年山东省专升本考试高等数学Ⅲ试题和答案
- 抗血栓药物临床应用与案例分析课件
- 吉林省地方教材家乡小学二年级下册家乡教案
- 决策树在饲料技术推广中的应用研究
- 儿童长期卧床的护理
- 投标书细节美化教程
- 《小儿支气管肺炎》课件
评论
0/150
提交评论