




已阅读5页,还剩2页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
摘要:随着计算机信息技术的飞速发展,计算机网络已广泛用于经济、军事、教育等各个领域。计算机网络在带来海量信息的同时,由于网络的开放性和自由性也产生了私有信息和数据被破坏或侵犯的可能性。因此, 网络信息的安全性变得El益重要起来。对目前计算机网络存在的安全隐患进行了分析,并探讨了针对计算机安全隐惠的防范策略。关键词:计算机网络;信息安全;防范策略1、引言随着社会的发展,人们对网络信息的需求和依赖日益增强。网络技术的高度发展,为我们进行现代化建设提供了技术保障。然而,网络应用中存在着许多不安全因素,其主要表现在信息泄漏、信息篡改、非法使用网络资源、非法信息渗透、假冒等。由于普遍存在着计算机网络安全隐患多,防“黑客”能力弱,个人、企业和政府网站遭“攻击” 的事件时有发生,造成了巨大的经济损失,因此,计算机网络信息系统的安全与防范显得越发重要。2、计算机网络信息存在的安全隐患计算机网络信息安全是指利用网络管理控制和技术措施,防止网络本身及网上传输的信息数据被故意地或偶然地非授权泄漏、更改、破坏,或使网上传输的信息被非法系统辨认、控制,即确保网上传输的信息数据的完整性、保密性、可用性受到保护。所谓“信息安全”,就是指在计算机网络环境下运行的信息处理系统的安全,主要有两层含义:一是对信息处理系统的安全保护,二是对信息处理系统中的信息的安全保护。目前,在网络信息安全方面,主要存在以下的安全隐患:2.1网络病毒网络病毒是通过网络作为载体进行传染的,传播的主一要方式有电子邮件和访问传染。现在电子邮件在网络中的 使用频率越来越高,为计算机病毒提供了新的传播途径。访问传染就是利用用户访问自己的网站或下载文件资料的同时传播病毒,达到破坏用户利益的目的。网络病毒对于信息系统具有很大的威胁。2.2网络泄密网络泄密就是用户利用计算机在计算机网络上处理和传输信息时,因错误操作或加密程序失效或受到非法攻击而导致的泄密。包括局域网、广域网、卫星通信网等的计算机通信,Email电子信箱,图文数据传输时的泄密以及黑客攻击窃密等。通过网络窃取别国的重要政治经济军事情报已经成为国际间谍窃密的主要手段和方法,因此应将公开信息与机密信息区分开来,把用来上网的计算机与处理内部机密信息的计算机严格隔离控制,以免信息泄密。2.3网络攻击网络攻击包括内部攻击和远程攻击。内部攻击是在局域网内采取攻击的手段获取超越权限的信息资料。远程攻击是指通过扫描程序等网络工具对远程机器的网络概况、操作系统信息的搜索,发现有关目标机器的详细资料,利用口令攻击程序等工具,对目标机器的文件资料、配置进行阅读、拷贝、修改,对远程计算机进行控制,从而达到远程攻击的目的。远程攻击主要有:(1)口令攻击者利用口令攻击程序对原来加密的程序进行解密,并使口令显露出来。(2)利用自动检测远程或本地主机安全性弱点的程序的扫描器。(3)利用邮件对邮件服务器进行攻击,破坏目标机器的数据,甚至使目标机器中止运行的程序等 。3、计算机网络信息安全的防范技术针对网络安全存在的隐患,网络安全防范技术主要有以下几种方式:病毒防范、泄密防范和安全管理防范、攻击防范等。3.1病毒防范网络病毒防范应从整体防御、防管结合及多层防御等方面进行考虑。整体防御是在管理中心对系统中的计算机进行扫描,设置在线报警功能,发现病毒入侵及时提醒,并予以解决。防管结合是防病毒与网络管理相结合,在所有病毒容易入侵处采取相应的防范措施,在网管所涉及的重要部位安置防病毒软件,防止病毒侵袭。多层防御即采用实时扫描、完整性保护和完整性检验等不同层次的技术来检测病毒,以防止病毒感染和传播 。3.2泄密防范和安全管理防范当管理机密信息的人员无意中利用处理机密的计算机单机(终端)违规拨号上网时,容易造成泄密,引起网络一 砉 譬蒿 篓 窑理制度。网络安全管理的主要途径就是增强网络用户的防范意识和防范能力。因此,组织开展多层次、多方位的信息网络安全宣传和培训,提高网络用户维护网络安全的警惕性和自觉性,增强网络用户的安全防范意识和防范能力是避免信息网络安全事件发生的有效途径。3.3攻击防范攻击防范是网络安全防范的重中之重。攻击防范技术主要有:防火墙技术、安全检查技术、入侵检测等。3.3.1防火墙技术作为Internet环境下的一种特有网络技术,防火墙是在内部网和外网之间构造了一个保护层,强制所有的访问或连接都必须经过这一保护层,并在此进行检查和连接。防火墙的主要功能是加强网络之间的访问控制,对网络之间传输的数据包和链接方式按照一定的安全策略进行检查,以决定网络之间的通信是否被允许,并监视网络运行状态。防火墙技术主要分为三大类:一是包过滤技术,使用过滤器来检查数据包的来源和目的地,以确定接收或拒绝数据包,它一般作用在网络层(IP层);二是代理(Proxy)服务技术,它用在应用层,起到外部网络向内部网络申请服务时中间转接作用,主要控制哪些用户能访问哪些服务类型;三是状态监控技术,它是一种新的防火墙技术,在网络层完成所必要的防火墙功能一包过滤和网络服务代理 。3.3.2安全检查(身份验证)技术计算机对用户的识别,主要是核查用户的口令,网内合法用户使用资源信息也有使用权限问题,为防止口令被攻击者破解,应合理设置安全口令和加强对口令的使用管理。另外,也可采用指纹、声音、视网膜图像等对用户进行鉴别 。3.3.3入侵检测.攻击防御技术入侵检测、攻击防御技术系统是按对整个网络上的各处活动进行,判断网络上的违规活动向系统管理员报警的同时按照管理员制定的规则进行阻断或其他防范的措施。它可以对付来自内部网络的攻击,还能够阻止黑客的入侵。可分为基于主机和基于网络两种:基于主机的入侵检测系统用于保护关键应用的服务器,实时监视可疑的连接,系统日志检查非法访问的闯入等,并且提供对典型应用的监视,如Web服务器应用;基于网络的入侵检测系统用于实时监控网络关键路径的信息。 Abstract: with the rapid development of computer information technology, computer network has been widely used in economic, military, education and other fields. Computer networks bring in huge amounts of information at the same time, due to the openness and freedom of network also had private information and data are destroyed or the possibility of infringement. Therefore, the network information security became El increasingly important. Hidden trouble in security of current computer network are analyzed, and discussed the Yin huis defensive strategy for computer security.Key words: computer network; Information security; Prevention strategies1, the introductionWith the development of the society, people growing demand for network information and rely on. The height of the development of network technology, and provides technical support for our modernization construction. However, there are many unsafe factors in the network application, its main performance in information leakage, tampering, illegal use of network resources and illegal information penetration, counterfeit, etc. Because common computer network security hidden trouble is much, ability is weak, hackers individuals, businesses and government websites were attack events have occurred, caused enormous economic loss, therefore, the computer network information system security and prevent appears increasingly important.2, computer network information security hidden danger existsComputer network information security is refers to the use of network management technology and control measures to prevent the network transmission of information itself and the Internet data is intentionally or accidentally unauthorized leaks, change, destruction, or make the transmission of information is illegal online system to identify and control, which is to ensure that the integrity of data transmission of information on Internet, confidentiality, availability, are protected. , the so-called information security means to run under the network environment in the computer information processing system safety, mainly has two meanings: one is to protect the safety of the information processing system, 2 it is security and protection of the information in the information processing system. At present, in the network information security, the safe hidden trouble that there are the following:2.1 network virus, network virus is transmitted through the network as the carrier, the transmission way of the Lord will have E-mail transmission and access. Now the email in the network Use frequency more and more high, for the computer provides a new route of transmission of the virus.Access transmission is to use the user access to your web site or download file data transmission at the same time, damage the interests of the users. Network virus has a big threat for information system.2.2 users network leak leak is using the computer information processing and transmission on the computer network, due to wrong operation or encryption program failure or illegal attacks and cause leaks. Including LAN, wan, satellite communications network, such as the computer communication, E - mail E-mail, graphic data transmission of leaks and hacker attacks such as espionage. Steal other countries through a network of military intelligence has become an international spy important political and economic espionage main means and methods, therefore should distinguish public information and confidential information, the used of computer Internet and deal with internal computer strict isolation control of confidential information, in order to avoid the leak of information.2.3 network attack cyber attacks including internal attacks and ranged attacks. Internal attack is to attack in the local area network (LAN) means to obtain information beyond the scope of authorization. Ranged attack is to point to by scanning program online tools such as the general situation of the network to the remote machine, operating system, information search, find the relevant details of the target machine, using tools such as the password attack programs, documents, configuration of the target machine to read, copy, modify, to control the remote computer, so as to achieve the aim of ranged attack. Ranged attack mainly include: (1) the password the attacker using password attack procedures of original encryption, decryption and password. (2) the use of automatic detection of remote or local host security vulnerabilities scanner of the program. (3) the use of email for mail server attacks, destroy target machine data, and even make the target machine to suspend the running program.3, computer network information security technology to preventAiming at the existing hidden trouble of network security, network security technology basically has the following several ways: virus prevention, leak prevention and safety management to prevent and attack prevention, etc.3.1 virus prevention network virus prevention should begin from the whole defense, prevent the respect such as pipe combination and multilayer defense for consideration. Overall defence is in the center of the management system of the computer for scanning, set up online alarm function, found that the virus invasion timely warning, and resolved. Is antivirus tube combined with prevention and the combination of network management, at all easy to invasion to take corresponding measures to prevent, important parts of the network management involves placing in anti-virus software, prevent virus attacks. Multilayer defense namely using real-time scanning, integrity protection, and integrity checking, such as different levels of technology to detect virus in order to prevent the virus infection and spread.3.2 leak prevention and safety management to prevent confidential information when management personnel inadvertently used processing confidential computer LAN (terminal) violations dial-up Internet access, easy to cause leaks, cause a network a Hua Pi artemisia basket kiln system. Network security management is the main way to enhance network users awareness and prevention capacity. Therefore, the organization to carry out multi-level and multi-dimensional information network safety propaganda and training, improve the network users maintain vigilance and consciousness of network security, enhance network user security awareness and prevention capacity is an effective way to avoid information network security event.3.3 attack against attack prevention is the key of the network security. Attacks against technology mainly include: firewall technology, security inspection technology, intrusion detection, etc.3.3.1 firewall technology as a unique network under the environment of Internet technology, firewall is between the Intranet and network constructed a protective layer, all mandatory access or connection must go through this protective layer, and the inspection and the connection.Firewall between main function is to strengthen network access control, mode of transmission of packets and links between network according to certain security policy for inspection, to determine whether the network communication between the allowed, and monitor the network running status.Firewall technology is mainly divided into three categories: one is the packet filter technology, use the filter to check the packet source and destination, to determine accept or reject a packet, it normally work in the network layer (IP layer); Second, agents (Proxy) service technology, it is used in the application layer, a external to internal network application service switching function, main control which users can access which service type; 3 it is condition monitoring technology, it is a new kind of firewall technology, complete the necessary firewall in the network layer function a pack of filter and network service agency.3.3.2 rainfall distribution on 10-12 computer security (authentication) technology to the users recognition, mainly check the users password, legal users to use the network resources also have the problem of access to information, to prev
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 风光储一体化系统2025年在农村地区电网建设的投资回报分析报告
- 2025年废旧电子产品回收与资源回收行业绿色转型路径与市场前景分析
- 2025年金融数据治理与数据资产化技术变革趋势分析报告
- 2025年氢能重卡在机场货运中的技术创新与市场分析报告
- 2025年新能源汽车电池热失控安全性能测试与评估报告
- 演唱 猎人合唱教学设计初中音乐人音版九年级上册-人音版
- 2025年中国高纯镍丝行业市场分析及投资价值评估前景预测报告
- 2025年中国高纯度碳酸亚乙烯酯行业市场分析及投资价值评估前景预测报告
- 2025年中国甘油三(乙基己酸)酯行业市场分析及投资价值评估前景预测报告
- 2025年深海矿产资源勘探技术深海油气资源勘探设备技术进展与应用前景
- 眉山市发展和改革委员会市项目工作推进中心公开选调事业人员的考试参考题库及答案解析
- 与生育相关的慢性子宫内膜炎诊治专家共识(2025年版)解读
- 吉林省吉林市第四中学校2024-2025学年高一上学期9月第一次月考生物学试卷(含答案)
- 2024年齐齐哈尔医学院公开招聘辅导员笔试题含答案
- 港口码头安全培训知识课件
- 2024义务教育科学新课标课程标准考试真题及答案
- (2025年标准)化妆学员协议书
- DG-TJ08-2461-2024 旧住房更新改造查勘标准
- 闲置资产盘活管理办法
- 中职历史说课课件
- 遥感科学与技术课件
评论
0/150
提交评论