




免费预览已结束,剩余1页可下载查看
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
湖南软件职业学院计算机专业英语(论文) AbstractComputer Network Security Theory and Practice introduces to the reader a complete and concise view of network security. It provides in-depth theoretical coverage of recent advancements and practical solutions to network security threats. This book can be used for a one-semester network security course for graduate and upper-level undergraduate students, as well as a reference for IT professionals.Computer SecurityI. Threats to Computer Security Threats to computer security are computer crimes (including viruses and electronic break-ins) and natural and other hazards. 1. Computer Criminals A computer crime is an illegal action in which the perpetrator uses special knowledge of computer technology. Computer criminals are of four types: (1) Employees The largest category of computer criminals consists of those with the easiest access to computers-namely, employees. Sometimes the employee is simply trying to steal something from the employer-equipment, software, electronic funds, proprietary information, or computer time. Sometimes the employee may be acting out of resentment and is trying to get back at the company. (2) Outside Users Not only employees but also some suppliers or clients may have access to a companys computer system. Examples are bank customers who use an automatic teller machine. Like employees, these authorized users mayobtain confidential passwords or find other ways of committing computer crimes. (3) “Hackers” and “Crackers” Some people think of these two groups as being the same, but they are not. Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it. Crackers do the same thing but for malicious purposes. They may intend to steal technical information or to introduce what they call a “bomb”-a destructive computer program-into the system. (4) Organized Crime Organized crime has discovered that computers can be used just like legitimate business people use them, but for illegal purposes. For example, computers are useful for keeping track of stolen goods or illegal gambling debts. In addition, counterfeiters and forgers use microcomputers and printers to produce sophisticated-looking documents such as checks and drivers licenses.II. Computer systems and data besides criminals. They include the following: (1)Natural Hazards Natural forces include fires, floods, wind, hurricanes, tornadoes, and earthquakes. Even home computer users should store backup disks of programs and data in safe locations in case of fire or storm damage. (2) Civil Strife and Terrorism Wars, riots, and other forms of political unrest are real risks in some parts of the world. Even people in developed countries, however, must bemindful that acts of sabotage are possible. (3) Technological Failures Hardware and software dont always do what they are supposed to do. For instance, too little electricity, caused by a brownout or blackout,may cause the loss of data in primary storage. Too much electricity, as when lightning or other electrical disturbance affects a power line, maycause a voltage surge, or spike. This excess of electricity may destroychips or other electronic components of a computer. Most microcomputer users buy a surge protector, a device thats parates the computer from the power source of the wall outlet. When a voltage surge occurs, it activates a circuit breaker in the surge protector, protecting the computer system. Another technological catastrophe is when a hard-disk drive suddenly “crashes,” or fails, perhaps because it has been bumped inadvertently. If the user has forgotten to make backup copies of data on the hard disk, data may be lost. (4) Human Errors Human mistakes are inevitable. Data-entry errors are probably the most commonplace. Programmer errors also occur frequently. Some mistakes may result from faulty design, as when a software manufacturer makes a deletion command closely resembling another command. Some errors may be the result of sloppy procedures. One such example occurs when office workers keep important correspondence under filenames that no one else in the office knows.III. Measures to Protect Computer Security Security is concerned with protecting information, hardware, and software. Security measures consist of encryption, restricting access, anticipating disasters, and making backup copies1. Restricting Access Security experts are constantly devising ways to protect computer systems from access by unauthorized persons. Sometimes security is a matter of putting guards on company computer rooms and checking the identification of everyone admitted. Oftentimes it is a matter of being careful about assigning passwords to people and of changing them when people leave a company. Passwords are secret words or numbers that must be keyed into a computer system to gain access. In some “dial-back” computer systems, the user telephones the computer, punches in the correct password, and hangs up. The computer then calls back at a certain preauthorized number. Most major corporations today use special hardware and software called firewalls to control access to their internal computer networks. These firewalls act as a security buffer between the corporations private network and all external networks, including the Internet. All electronic communications coming into and leaving the corporation must be evaluated by the firewall. Security is maintained by denying access to unauthorized communications.2. Backing up Data Equipment can always be replaced. A companys data, however, maybe irreplaceable. Most companies have ways of trying to keep software and data from being tampered with in the first place. They include careful screening of job applicants, guarding of passwords, and auditing of data and programs from time to time. The safest procedure, however, is to make frequent backups of data and to store them in remote locations.3 Security for Microcomputers If you own a microcomputer system, there are several procedures to follow to keep it safe: (1) Avoid Extreme Conditions Dont expose the computer to extreme conditions. Direct sun, rain from an open window, extreme temperatures, cigarette smoke, and spilled drinks or food
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 美甲合同转让协议书模板
- 花草租赁解除合同协议书
- 船员培训专项协议书模板
- 网页设计团队外包协议书
- 风力发电安装转让协议书
- 签了购房协议不给签合同
- 电梯加楼梯施工合同协议
- 职工餐厅承包合同协议书
- 门店分红股东协议书范本
- 腺肌病的护理
- 北京市朝阳区2024-2025学年高一下学期期末语文试题(含答案)
- 安徽高危人员管理办法
- 牙外伤护理配合课件
- 2025年辅警招聘考试试题及参考答案
- 2025年湖南省高考物理真题
- 2025年吉林省中考数学试卷真题(含答案详解)
- 党课课件含讲稿:以作风建设新成效激发干事创业新作为
- 军事知识科普儿童课件
- 谷歌付费协议书
- 爆破三员安全培训课件
- 《安全生产考核巡查办法》知识培训
评论
0/150
提交评论