计算机网络技术基础论文正稿_第1页
计算机网络技术基础论文正稿_第2页
计算机网络技术基础论文正稿_第3页
计算机网络技术基础论文正稿_第4页
计算机网络技术基础论文正稿_第5页
已阅读5页,还剩11页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1/10计算机网络技术基础论文络中存在着各种各样的安全漏洞和威胁。从广义息的性、完整性、可用性、真实性和可控性的到破坏、更改、泄露,系统连续可靠正常地运行.防止和传播后的后果,本质上是维护道德、法规或国家利是保护用户的利益和隐私网络安全与其所保护的信息计算机、网络、密码技术和信息安全技术,保护在和存储的信息的性、完整性和真实性.并对信息的传播算机网络安全机制分析管理程序以与它们的任意组合.2/10充、路由控制、公证等。安全性服务和安全性以是性服务的成分.而且还可以是完整性和鉴别服务的。数字签名可以用于鉴别服务,也可以通常的安全性经历是通过使用口令来实现访问控来对身份进行鉴别。在获得对数据的访问权之前.通以满足安全性要求。问卷与口令有很近的亲缘关系.措施信息安全防措施.是保证网络信息原理是利用一定的加密算法.将明文转换成为获取和理解原始数据起到了很好的阻止作3/10进行破坏以与确定发信人的身份.我标志通讯各方身份的一系列数据.它要接收端的公钥.把一个对称通信密信封只有指定的接收方才可以用自己的私钥己经成为现代社会的一个重要特征。信息本、就是生产力。因此.各国开始利用电子空间网络的技术的不断更新.单一的安全防护策略则统的概念未来的计算机网络安全防护策略方4/10不断的去探索,争取赶上发达国家的水平.保障我AbstractWhenmankindenteredthe1stcenturyinformationsociety,thenetworksocietyofthetimeChinawillestablishacompletesetofnetworksecuritysystemespeciallyfromthepolicyandlawtoestablishChinasowncharacteristics,networksecuritysystem.worksecuritypreventationcanhelpgroupsorindividualssothattheybenefitfromthesameinformationcanalsobeusedtoposeathreattothem,seddamageThereforenetworksecurityincludingthecompositionofworkhardwaresoftwareandnetworktransmissionofinformationsecuritysothattheydonotbecauseofaccidentalormaliciousdestructionoftheattacksnetworksecuritynotonlythetechnicalaspectsbutalsomanagementissues,bothcomplementeachother,areindispensable.rnetworksecurityStandardizationofcomputersecurityisdefined5/10oestablishadataprocessingsystemandtheadoptionoftechnologyandmanagementofsecurityprotectiontheprotectionofcomputerhardware,softwaredataisnotduetoaccidentalandmaliciousdestructionofreasons,changeandleakageTheabovedefinitionofcomputersecurityincludesphysicalsecurityandlogicalsecurityofboththecontentsofthecontentsofthelogicofsecuritycouldbeunderstoodasweoftensaythattheinformationsecurityinformationreferstotheconfidentiality,integrityandavailabilityofprotectionandnetworksecurityInformationsecurityisthemeaningoftheextensionthatnetworksecurityisanetworkofinformationconfidentiality,integrityandavailabilityprotectionComputernetworksecurityasthespecificmeaningoftheuserchangestheuserisdifferentonthenetworksecurityawarenessandrequirementswillbedifferent.Fromtheordinaryuser'spointofviewcouldonlyhopethatpersonalprivacyorconfidentialinformationtransmissiononthenetworkbeprotectedagainsteavesdropping,tamperingandforgeryandnetworkproviderinadditiontocareaboutthesenetworkinformationsecuritywemustalsoconsiderhowtodealwithsuddennaturaldisasterssuchasmilitarystrikesagainstthedestructionofnetworkhardware,aswellasunusualinthenetworkhowtorestorenetworkcommunications,andmaintainthecontinuityofnetworkcommunications.yincludingthecompositionofnetworkhardwaresoftwareandnetworktransmissionofinformationsecurity,sothattheydonotbecauseofaccidentalormaliciousattacksonthedestructionof6/10hnicalaspectsofnetworksecurityissuestherearemanagementidescomplementeachotherareindispensableManmadeonandattacksmakesnetworksecurityisfacingnewchallengesputernetworksecuritystatusquoetworksecurityisthenetworkhardwaresoftwareanddatasystemsareprotectedfromaccidentalormaliciousdestructionofreasons,alterationdisclosurethesystemcontinuous,reliable,normaloperationofnetworkserviceswithoutdisruptionComputerandnetworktechnologyhasthecomplexityanddiversitymakescomputerandnetworksecurityhasbecomeaneedtocontinuetoupdateandimprovethearea.Atpresent,hackersmethodhasbeenmorethanthetypeofcomputervirus,andmanyattacksarefatal.IntheInternetnetworkbecausetheInternetdoesnothavethetimeandgeographicalconstraintswheneverthereisameanstogeneratenewattacks,wecaninaweekaroundtheworld,theseattacksmeanstheuseofnetworkandsystemvulnerabilitiestoattackcomputersystemsandresultinginnetworkparalysisWormsbackdoor(Back-doors),Rootkits,DOS(DenialofServices)andSniffernetworkmonitor)isafamiliarmeansofseveralhackerattacks.HowevernoneoftheseattacksmeanstheyreflecttheastonishingpoweroftodaybecomeworseThesetypesofattacksmeansthenewvariant,withpreviousattacksappearedmethodsmoreintelligent,targetedagainstInternetbasedprotocolsandoperatingsystemlevel.FromtheWebprocess7/10trolprocedurestothekernellevelRootletsHackerspracticesescalatingeusersabilitytoguardagainstinformationsecuritychallengeirdcomputernetworksecurityprecautionstworkmanagementandtheuseofsafetyawarenessamongstaffmanycomputersystemscommonlyusedpasswordstocontrolaccesstosystemresources,whichisanti-virusprocess,themostvulnerableandthemosteconomicalmethods.Networkadministratorandterminaloperatorprivilegesinaccordancewiththeirresponsibilities,chooseadifferentpasswordfortheapplicationdatalegitimateoperation,topreventunauthorizeduserstoaccessthedataandtheuseofnetworkresources.Onthenetworksoftwareinstallationandmanagementiscrucial,itisnotonlyrelatedtonetworkmaintenanceandmanagementefficiencyandquality,butalsotothenetworksecurity.AgoodantivirussoftwarecanbeeasilyinstalledwithinminutestotheorganizationeachNTservercanalsobedownloadedandspreadtoallthepurposeofthemachinebythenetworkadministratorsetupandmanagetofocus,itwillworkwiththeoperatingsystemandothersecurityiscloselylinkedtobecomeapartofnetworksecuritymanagement,andautomaticallyprovidethebestnetworkvirusdefensivemeasures.Whenthecomputervirusonlineresourcesapplicationsattack,suchasthevirusexistsintheinformation-sharingnetworkofmedia,itisnecessarytothesecurityatthegateway,onthenetworkfront-endforantivirus.8/10irewalltechnologynthenetworkaccesscontroltopreventtheexternalnetworkuserstoillegalmeanstoentertheexternalnetworkthroughtheinternalnetworkaccessinternalnetworkresourcesandprotecttheinternalnetworkoperatingenvironmentspecialforNetworkInterconnectionDevicesItisbetweentwoormorenetworkssuchaspackettransmissionlinkinaccordancewithacertaindegreeofsecuritystrategytoimplementtheinspectiontodeterminewhetherthenetworkcommunicationbetweenareallowedtoandmonitorthenetworkrunning.Althoughthefirewallistoprotectthenetworkfromaneffectivemeansofhacking,butthereareobviouslyinadequatethroughthefirewallcannotprotectagainstoutsideattackothermeanscannotpreventdefectorsfromtheinsideandinadvertentthreatsposedbyusersbutalsocannotcompletelypreventthetransmissionofthevirushavebeeninfectedwiththesoftwareordocuments,andcannotprotectagainstdata-drivenattacks.yencryptiontechnologyrtheglobalecommercetoprovideaguaranteesothatInternetbasedelectronictradingsystemhasbecomepossible,thusimprovingthesymmetricencryptionandasymmetricencryptiontechnologyisstillthemainstreamofthe1stcentury.Symmetricencryptiontotheconventionalpasswordbasedtechnologycomputingencryptionanddecryptionoperationsusethesamekey.Asymmetricencryption,encryption9/10sdifferentfromthedecryptionkeyencryptionkeysaremadepublicanyonecanuse,onlythedecryptionkeytodecryptpeopleknow.thenetworkhostoperatingsystemsecurityandphysicalsecuritymeasuresNetworkfirewallasthefirstlineofdefenseandcannotfullyprotecttheinternalnetworkmustbecombinedwithothermeasurestoimprovethesafetyofthesystemlevelAfterthefirewallisbasedonthenetworkhostoperatingsystemsecurityandphysicalsecuritymeasuresInaccordancewiththelevelfromlowtohighnamelythephysicalsecurityofthehostsystem,thecoreoperatingsystemsecuritysystemsecurityapplicationservicessecurityandfilesystemsecurityAtthesametimehostsecuritychecksandbugfixes,aswellasabackupsafetysystemasasupplementarysafetymeasures.Theseconstitutetheentirenetworksystemthesecondlineofdefense,themainpartofabreakthroughtopreventthefirewallaswellasattacksfromwithin.Systembackupisthelastlineofdefensenetworksystem,usedtoattackaftertheSystemRestoreThefirewallandhostsecuritymeasuresistheoverallsystemsecuritybyauditingintrusiondetectionandresponseprocessorconstitutetheoverallsafetyinspectionandresponsemeasuresItfromthenetworksystemfirewallnetworkhostorevendirectlyfromthenetworklinklayerontheextractionofnetworkstatusinformationasinputtotheintrusiondetectionsubsystemIntrusionDetectionSysteminaccordancewithcertainrule

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论