版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1/10计算机网络技术基础论文络中存在着各种各样的安全漏洞和威胁。从广义息的性、完整性、可用性、真实性和可控性的到破坏、更改、泄露,系统连续可靠正常地运行.防止和传播后的后果,本质上是维护道德、法规或国家利是保护用户的利益和隐私网络安全与其所保护的信息计算机、网络、密码技术和信息安全技术,保护在和存储的信息的性、完整性和真实性.并对信息的传播算机网络安全机制分析管理程序以与它们的任意组合.2/10充、路由控制、公证等。安全性服务和安全性以是性服务的成分.而且还可以是完整性和鉴别服务的。数字签名可以用于鉴别服务,也可以通常的安全性经历是通过使用口令来实现访问控来对身份进行鉴别。在获得对数据的访问权之前.通以满足安全性要求。问卷与口令有很近的亲缘关系.措施信息安全防措施.是保证网络信息原理是利用一定的加密算法.将明文转换成为获取和理解原始数据起到了很好的阻止作3/10进行破坏以与确定发信人的身份.我标志通讯各方身份的一系列数据.它要接收端的公钥.把一个对称通信密信封只有指定的接收方才可以用自己的私钥己经成为现代社会的一个重要特征。信息本、就是生产力。因此.各国开始利用电子空间网络的技术的不断更新.单一的安全防护策略则统的概念未来的计算机网络安全防护策略方4/10不断的去探索,争取赶上发达国家的水平.保障我AbstractWhenmankindenteredthe1stcenturyinformationsociety,thenetworksocietyofthetimeChinawillestablishacompletesetofnetworksecuritysystemespeciallyfromthepolicyandlawtoestablishChinasowncharacteristics,networksecuritysystem.worksecuritypreventationcanhelpgroupsorindividualssothattheybenefitfromthesameinformationcanalsobeusedtoposeathreattothem,seddamageThereforenetworksecurityincludingthecompositionofworkhardwaresoftwareandnetworktransmissionofinformationsecuritysothattheydonotbecauseofaccidentalormaliciousdestructionoftheattacksnetworksecuritynotonlythetechnicalaspectsbutalsomanagementissues,bothcomplementeachother,areindispensable.rnetworksecurityStandardizationofcomputersecurityisdefined5/10oestablishadataprocessingsystemandtheadoptionoftechnologyandmanagementofsecurityprotectiontheprotectionofcomputerhardware,softwaredataisnotduetoaccidentalandmaliciousdestructionofreasons,changeandleakageTheabovedefinitionofcomputersecurityincludesphysicalsecurityandlogicalsecurityofboththecontentsofthecontentsofthelogicofsecuritycouldbeunderstoodasweoftensaythattheinformationsecurityinformationreferstotheconfidentiality,integrityandavailabilityofprotectionandnetworksecurityInformationsecurityisthemeaningoftheextensionthatnetworksecurityisanetworkofinformationconfidentiality,integrityandavailabilityprotectionComputernetworksecurityasthespecificmeaningoftheuserchangestheuserisdifferentonthenetworksecurityawarenessandrequirementswillbedifferent.Fromtheordinaryuser'spointofviewcouldonlyhopethatpersonalprivacyorconfidentialinformationtransmissiononthenetworkbeprotectedagainsteavesdropping,tamperingandforgeryandnetworkproviderinadditiontocareaboutthesenetworkinformationsecuritywemustalsoconsiderhowtodealwithsuddennaturaldisasterssuchasmilitarystrikesagainstthedestructionofnetworkhardware,aswellasunusualinthenetworkhowtorestorenetworkcommunications,andmaintainthecontinuityofnetworkcommunications.yincludingthecompositionofnetworkhardwaresoftwareandnetworktransmissionofinformationsecurity,sothattheydonotbecauseofaccidentalormaliciousattacksonthedestructionof6/10hnicalaspectsofnetworksecurityissuestherearemanagementidescomplementeachotherareindispensableManmadeonandattacksmakesnetworksecurityisfacingnewchallengesputernetworksecuritystatusquoetworksecurityisthenetworkhardwaresoftwareanddatasystemsareprotectedfromaccidentalormaliciousdestructionofreasons,alterationdisclosurethesystemcontinuous,reliable,normaloperationofnetworkserviceswithoutdisruptionComputerandnetworktechnologyhasthecomplexityanddiversitymakescomputerandnetworksecurityhasbecomeaneedtocontinuetoupdateandimprovethearea.Atpresent,hackersmethodhasbeenmorethanthetypeofcomputervirus,andmanyattacksarefatal.IntheInternetnetworkbecausetheInternetdoesnothavethetimeandgeographicalconstraintswheneverthereisameanstogeneratenewattacks,wecaninaweekaroundtheworld,theseattacksmeanstheuseofnetworkandsystemvulnerabilitiestoattackcomputersystemsandresultinginnetworkparalysisWormsbackdoor(Back-doors),Rootkits,DOS(DenialofServices)andSniffernetworkmonitor)isafamiliarmeansofseveralhackerattacks.HowevernoneoftheseattacksmeanstheyreflecttheastonishingpoweroftodaybecomeworseThesetypesofattacksmeansthenewvariant,withpreviousattacksappearedmethodsmoreintelligent,targetedagainstInternetbasedprotocolsandoperatingsystemlevel.FromtheWebprocess7/10trolprocedurestothekernellevelRootletsHackerspracticesescalatingeusersabilitytoguardagainstinformationsecuritychallengeirdcomputernetworksecurityprecautionstworkmanagementandtheuseofsafetyawarenessamongstaffmanycomputersystemscommonlyusedpasswordstocontrolaccesstosystemresources,whichisanti-virusprocess,themostvulnerableandthemosteconomicalmethods.Networkadministratorandterminaloperatorprivilegesinaccordancewiththeirresponsibilities,chooseadifferentpasswordfortheapplicationdatalegitimateoperation,topreventunauthorizeduserstoaccessthedataandtheuseofnetworkresources.Onthenetworksoftwareinstallationandmanagementiscrucial,itisnotonlyrelatedtonetworkmaintenanceandmanagementefficiencyandquality,butalsotothenetworksecurity.AgoodantivirussoftwarecanbeeasilyinstalledwithinminutestotheorganizationeachNTservercanalsobedownloadedandspreadtoallthepurposeofthemachinebythenetworkadministratorsetupandmanagetofocus,itwillworkwiththeoperatingsystemandothersecurityiscloselylinkedtobecomeapartofnetworksecuritymanagement,andautomaticallyprovidethebestnetworkvirusdefensivemeasures.Whenthecomputervirusonlineresourcesapplicationsattack,suchasthevirusexistsintheinformation-sharingnetworkofmedia,itisnecessarytothesecurityatthegateway,onthenetworkfront-endforantivirus.8/10irewalltechnologynthenetworkaccesscontroltopreventtheexternalnetworkuserstoillegalmeanstoentertheexternalnetworkthroughtheinternalnetworkaccessinternalnetworkresourcesandprotecttheinternalnetworkoperatingenvironmentspecialforNetworkInterconnectionDevicesItisbetweentwoormorenetworkssuchaspackettransmissionlinkinaccordancewithacertaindegreeofsecuritystrategytoimplementtheinspectiontodeterminewhetherthenetworkcommunicationbetweenareallowedtoandmonitorthenetworkrunning.Althoughthefirewallistoprotectthenetworkfromaneffectivemeansofhacking,butthereareobviouslyinadequatethroughthefirewallcannotprotectagainstoutsideattackothermeanscannotpreventdefectorsfromtheinsideandinadvertentthreatsposedbyusersbutalsocannotcompletelypreventthetransmissionofthevirushavebeeninfectedwiththesoftwareordocuments,andcannotprotectagainstdata-drivenattacks.yencryptiontechnologyrtheglobalecommercetoprovideaguaranteesothatInternetbasedelectronictradingsystemhasbecomepossible,thusimprovingthesymmetricencryptionandasymmetricencryptiontechnologyisstillthemainstreamofthe1stcentury.Symmetricencryptiontotheconventionalpasswordbasedtechnologycomputingencryptionanddecryptionoperationsusethesamekey.Asymmetricencryption,encryption9/10sdifferentfromthedecryptionkeyencryptionkeysaremadepublicanyonecanuse,onlythedecryptionkeytodecryptpeopleknow.thenetworkhostoperatingsystemsecurityandphysicalsecuritymeasuresNetworkfirewallasthefirstlineofdefenseandcannotfullyprotecttheinternalnetworkmustbecombinedwithothermeasurestoimprovethesafetyofthesystemlevelAfterthefirewallisbasedonthenetworkhostoperatingsystemsecurityandphysicalsecuritymeasuresInaccordancewiththelevelfromlowtohighnamelythephysicalsecurityofthehostsystem,thecoreoperatingsystemsecuritysystemsecurityapplicationservicessecurityandfilesystemsecurityAtthesametimehostsecuritychecksandbugfixes,aswellasabackupsafetysystemasasupplementarysafetymeasures.Theseconstitutetheentirenetworksystemthesecondlineofdefense,themainpartofabreakthroughtopreventthefirewallaswellasattacksfromwithin.Systembackupisthelastlineofdefensenetworksystem,usedtoattackaftertheSystemRestoreThefirewallandhostsecuritymeasuresistheoverallsystemsecuritybyauditingintrusiondetectionandresponseprocessorconstitutetheoverallsafetyinspectionandresponsemeasuresItfromthenetworksystemfirewallnetworkhostorevendirectlyfromthenetworklinklayerontheextractionofnetworkstatusinformationasinputtotheintrusiondetectionsubsystemIntrusionDetectionSysteminaccordancewithcertainrule
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024委托演艺服务合同
- Excel单元格格式设置教案
- 综合英语课程Unit1 NeverSayGoodbye
- 2024婚介服务合同范文
- 2024-2029年中国美白化妆品行业市场发展现状及竞争格局与投资发展研究报告
- 2024-2029年中国网约车行业经营管理风险与发展对策建议报告
- 2024-2029年中国缝纫机行业深度调研及投资前景预测研究报告
- 2024-2029年中国综艺节目行业市场发展现状及发展趋势与投资前景研究报告
- 2024-2029年中国经济型轿车市场发展分析及投资前景预测报告预测
- 2024-2029年中国线扣行业市场现状分析及竞争格局与投资发展研究报告
- 2024年云南省昆明市西山区中考二模地理试题
- 2024年山东省济南市历下区中考三模物理试题
- 财富管理的行为金融
- “红旗杯”竞赛总题库-2班组长成本绩效管理能力考试题库(附答案)
- 网页制作智慧树知到期末考试答案章节答案2024年溆浦县职业中等专业学校
- 2024-2029年纸包装行业市场现状供需分析及市场深度研究发展前景及规划投资研究报告
- 2024中考地理临考逆袭卷2含解析-湖南专用
- 外科科室发展规划
- 氨溴索注射液对急慢性鼻窦炎的疗效评价
- 营养与食疗学智慧树知到期末考试答案2024年
- 2024届全国统一高考试题答案
评论
0/150
提交评论