计算机英语(下篇共上中下3篇)_第1页
计算机英语(下篇共上中下3篇)_第2页
计算机英语(下篇共上中下3篇)_第3页
计算机英语(下篇共上中下3篇)_第4页
计算机英语(下篇共上中下3篇)_第5页
已阅读5页,还剩321页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1BasicComponents2ThreatsandAttacks3SecurityStrategy4MeasurestoProtectComputerSecurity5MalwareLeadin

Thetermcomputersecurityisusedfrequently,butthecontentofacomputerisvulnerabletofewrisksunlessthecomputerisconnectedtoothercomputersonanetwork.Astheuseofcomputernetworks,especiallytheInternet,hasbecomepervasive,theconceptofcomputersecurityhasexpandedtodenoteissuespertainingtothenetworkeduseofcomputersandtheirresources.1BasicComponents

ThemajortechnicalareasofcomputersecurityareusuallyrepresentedbytheinitialsCIA:confidentiality,integrity,andavailability.BasicComponents1

Confidentialityistheconcealmentofinformationorresources.Theneedforkeepinginformationsecretarisesfromtheuseofcomputersinsensitivefieldssuchasgovernmentandindustry.Forexample,militaryandcivilianinstitutionsinthegovernmentoftenrestrictaccesstoinformationtothosewhoneedthatinformation.Asafurtherexample,alltypesofinstitutionskeeppersonnelrecordssecret.Accesscontrolmechanismssupportconfidentiality.Oneaccesscontrolmechanismforpreservingconfidentialityiscryptography,whichscramblesdatatomakeitincomprehensible.BasicComponents1Confidentiality

Integrityreferstothetrustworthinessofdataorresources,anditisusuallyphrasedintermsofpreventingimproperorunauthorizedchange.Integrityincludesdataintegrity(thecontentoftheinformation)andoriginintegrity(thesourceofthedata,oftencalledauthentication).Workingwithintegrityisverydifferentfromworkingwithconfidentiality.Withconfidentiality,thedataiseithercompromisedoritisnot,butintegrityincludesboththecorrectnessandthetrustworthinessofthedata.Theoriginofthedata(howandfromwhomitwasobtained),howwellthedatawasprotectedbeforeitarrivedatthecurrentmachine,andhowwellthedataisprotectedonthecurrentmachineallaffecttheintegrityofthedata.BasicComponents1Integrity

Availabilityreferstotheabilitytousetheinformationorresourcedesired.Availabilityisanimportantaspectofreliabilityaswellasofsystemdesignbecauseanunavailablesystemisatleastasbadasnosystematall.Theaspectofavailabilityrelevanttosecurityisthatsomeonemaydeliberatelyarrangetodenyaccesstodataortoaservicebymakingitunavailable.“Denialofservice(DoS)”attacksareattacksagainstavailability.BasicComponents1Availability2ThreatsandAttacks

Athreatisapotentialviolationofsecurity.Anattackisanyattempttodestroy,expose,alter,disable,stealorgainunauthorizedaccesstoormakeunauthorizeduseofanasset.Thosewhoexecuteattacks,orcausethemtobeexecuted,arecalledattackers.Passiveattackandactiveattackaretwotypesofattacks.Apassiveattackattemptstolearnormakeuseofinformationfromthesystembutdoesnotaffectsystemresourceswhereasanactiveattackattemptstoaltersystemresourcesoraffecttheiroperation.Thethreesecurityservicesconfidentiality,integrity,andavailabilitycounterthreatstothesecurityofasystem.Belowweintroducecommonthreats.ThreatsandAttacks2ThreatsandAttacks2Snooping01

Snoopingisanunauthorizedinterceptionofinformation.Itispassive,suggestingsimplythatsomeentityislisteningto(orreading)communicationsorbrowsingthroughfilesorsysteminformation.Wiretapping,orpassivewiretapping,isaformofsnoopinginwhichanetworkismonitored.(Itiscalled“wiretapping”becauseofthe“wires”thatcomposethenetwork,althoughthetermisusedevenifnophysicalwiringisinvolved.)Confidentialityservicescounterthisthreat.ThreatsandAttacks2

Modificationoralterationisanunauthorizedchangeofinformation.Unlikesnooping,modificationisactive;itresultsfromanentitychanginginformation.Activewiretappingisaformofmodificationinwhichdatamovingacrossanetworkisaltered;theterm“active”distinguishesitfromsnooping.Anexampleistheman-in-the-middle(MITM)attack,inwhichanintruderreadsmessagesfromthesenderandsends(possiblymodified)versionstotherecipient,inthehopethattherecipientandthesenderwillnotrealizethepresenceoftheintermediary.[1]Integrityservicescounterthisthreat.02ModificationThreatsandAttacks2

Masqueradingorspoofingisanimpersonationofoneentitybyanother.Itluresavictimintobelievingthattheentitywithwhichitiscommunicatingisadifferententity.Forexample,ifausertriestologintoacomputeracrosstheInternetbutinsteadreachesanothercomputerthatclaimstobethedesiredone,theuserhasbeenspoofed.Similarly,ifausertriestoreadafile,butanattackerhasarrangedfortheusertobegivenadifferentfile,anotherspoofhastakenplace.Thismaybeapassiveattack(inwhichtheuserdoesnotattempttoauthenticatetherecipient,butmerelyaccessesit),butitisusuallyanactiveattack(inwhichthemasqueraderissuesresponsestomisleadtheuseraboutitsidentity).Althoughprimarilydeception,itisoftenusedtousurpcontrolofasystembyanattackerimpersonatinganauthorizedmanager.[2]Integrityservicescounterthisthreat.03MasqueradingThreatsandAttacks2

Repudiationoforiginisafalsedenialthatanentitysent(orcreated)something.Forexample,supposeacustomersendsalettertoavendoragreeingtopayalargeamountofmoneyforaproduct.Thevendorshipstheproductandthendemandspayment.Thecustomerdenieshavingorderedtheproductandbylawisthereforeentitledtokeeptheunsolicitedshipmentwithoutpayment.Thecustomerhasrepudiatedtheoriginoftheletter.Ifthevendorcannotprovethatthelettercamefromthecustomer,theattacksucceeds.Avariantofthisisdenialbyauserthathecreatedspecificinformationorentitiessuchasfiles.Integritymechanismscopewiththisthreat.04RepudiationofOriginThreatsandAttacks2

Denialofservice(DoS)isalong-terminhibitionofservice.Theattackerpreventsaserverfromprovidingaservice.Thedenialmayoccuratthesource(bypreventingtheserverfromobtainingtheresourcesneededtoperformitsfunction),atthedestination(byblockingthecommunicationsfromtheserver),oralongtheintermediatepath(bydiscardingmessagesfromeithertheclientortheserver,orboth).Thisthreatisprobablythenastiest,andmostdifficulttoaddress.Itspremiseissimple:sendmorerequeststothemachinethanitcanhandle.Forexample,ifthehostisabletoanswer20requestspersecondandtheattackerissending50requestspersecond,obviouslythehostwillbeunabletoservealloftheattacker'srequests,muchlessanylegitimaterequests.Availabilitymechanismscounterthisthreat.05DenialofService3SecurityStrategySecurityStrategy3

Preventionmeansthatanattackwillfail.Forexample,ifoneattemptstobreakintoahostovertheInternetandthathostisnotconnectedtotheInternet,theattackhasbeenprevented.Typically,preventioninvolvesimplementationofmechanismsthatuserscannotoverrideandthataretrustedtobeimplementedinacorrect,unalterableway,sothattheattackercannotdefeatthemechanismbychangingit.Preventativemechanismsoftenareverycumbersomeandinterferewithsystemusetothepointthattheyhindernormaluseofthesystem.Butsomesimplepreventativemechanisms,suchaspasswords(whichaimtopreventunauthorizedusersfromaccessingthesystem),havebecomewidelyaccepted.Preventionmechanismscanpreventcompromiseofpartsofthesystem;onceinplace,theresourceprotectedbythemechanismneednotbemonitoredforsecurityproblems,atleastintheory.SecurityStrategy31Prevention

Detectionismostusefulwhenanattackcannotbeprevented,butitcanalsoindicatetheeffectivenessofpreventativemeasures.Detectionmechanismsacceptthatanattackwilloccur;thegoalistodeterminethatanattackisunderway,orhasoccurred,andreportit.Theattackmaybemonitored,however,toprovidedataaboutitsnature,severity,andresults.Typicaldetectionmechanismsmonitorvariousaspectsofthesystem,lookingforactionsorinformationindicatinganattack.Agoodexampleofsuchamechanismisonethatgivesawarningwhenauserentersanincorrectpasswordthreetimes.Theloginmaycontinue,butanerrormessageinasystemlogreportstheunusuallyhighnumberofmistypedpasswords.Detectionmechanismsdonotpreventcompromiseofpartsofthesystem,whichisaseriousdrawback.Theresourceprotectedbythedetectionmechanismiscontinuouslyorperiodicallymonitoredforsecurityproblems.SecurityStrategy32Detection

Recoveryhastwoforms.Thefirstistostopanattackandtoassessandrepairanydamagecausedbythatattack.Asanexample,iftheattackerdeletesafile,onerecoverymechanismwouldbetorestorethefilefrombackuptapes.Inpractice,recoveryisfarmorecomplex,becausethenatureofeachattackisunique.Thus,thetypeandextentofanydamagecanbedifficulttocharacterizecompletely.Moreover,theattackermayreturn,sorecoveryinvolvesidentificationandfixingofthevulnerabilitiesusedbytheattackertoenterthesystem.Insomecases,retaliation(byattackingtheattacker’ssystemortakinglegalstepstoholdtheattackeraccountable)ispartofrecovery.Inallthesecases,thesystem’sfunctioningisinhibitedbytheattack.Bydefinition,recoveryrequiresresumptionofcorrectoperation.SecurityStrategy33Recovery

Inthesecondformofrecovery,thesystemcontinuestofunctioncorrectlywhileanattackisunderway.Thistypeofrecoveryisquitedifficulttoimplementbecauseofthecomplexityofcomputersystems.Itdrawsontechniquesoffaulttoleranceaswellastechniquesofsecurityandistypicallyusedinsafety-criticalsystems.Itdiffersfromthefirstformofrecovery,becauseatnopointdoesthesystemfunctionincorrectly.However,thesystemmaydisablenonessentialfunctionality.Ofcourse,thistypeofrecoveryisoftenimplementedinaweakerformwherebythesystemdetectsincorrectfunctioningautomaticallyandthencorrects(orattemptstocorrect)theerror.[3]SecurityStrategy33Recovery4MeasurestoProtectComputerSecurityMeasurestoProtectComputerSecurity4

Securityisconcernedwithprotectinginformation,hardware,andsoftware.Securitymeasuresconsistofencryption,restrictingaccess,anticipatingdisasters,andmakingbackupcopies.MeasurestoProtectComputerSecurity401020304Encryption

Wheneverinformationissentoveranetwork,thepossibilityofunauthorizedaccessexists.Thelongerthedistancethemessagehastotravel,thehigherthesecurityriskis.Thus,itisofgreatnecessityforindividualsandorganizationstoencrypttheirdata.Encryption,thetranslationofdataintoasecretcode,isthemosteffectivewaytoachievedatasecurity.Toreadanencryptedfile,onemusthaveaccesstoasecretkeyorpasswordthatenableshim/hertodecryptit.Therearetwomaintypesofencryption:symmetricencryptionandasymmetricencryption(alsocalledpublic-keyencryption).MeasurestoProtectComputerSecurity401020304Encryption

Theadvantageofusingsymmetricencryptionliesinitsfastencryptionanddecryptionprocesses(whencomparedwithasymmetricencryptionatthesamesecuritylevel).Thedisadvantagesare,first,theencryptionkeymustbeexchangedbetweentwopartiesinasecurewaybeforesendingsecretmessages.Secondly,onemustusedifferentkeyswithdifferentparties.Forexample,ifAcommunicateswithB,C,DandE,Ashoulduse4differentkeys.Otherwise,BwillknowwhatAandCaswellasAandDhasbeentalkingabout.ThedrawbacksofsymmetrickeyencryptionmakeitunsuitabletobeusedintheInternet,becauseit’sdifficulttofindasecurewaytoexchangetheencryptionkey.MeasurestoProtectComputerSecurity401020304Encryption

Forasymmetricencryption,thereisapairofkeysforeachparty:apublickeyandaprivatekey.Thepublickeyisfreelyavailabletothepublic,butonlythekeyownergetsholdoftheprivatekey.Messagesencryptedbyapublickeycanonlybedecryptedbyitscorrespondingprivatekey,andviceversa.WhenAsendsmessagetoB,AfirstgetsB'spublickeytoencryptthemessageandsendsittoB.Afterreceivingthemessage,Buseshisprivatekeytodecryptthemessage.Theadvantagecomesinthepublickeyfreelyavailabletothepublic,hencefreefromanykeyexchangeproblem.

MeasurestoProtectComputerSecurity401020304Encryption

Thedisadvantageistheslowencryptionanddecryptionprocess.AlmostallencryptionschemesusedintheInternetusesasymmetricencryptionforexchangingthesymmetricencryptionkey,andsymmetricencryptionforbetterperformance.Businesseshavebeenencryptingmessagesforyears.Individualsarealsousingencryptingprogramstosafeguardtheirprivatecommunications.OneofthemostwidelyusedpersonalencryptionprogramsisPrettyGoodPrivacy(PGP).PGPisanE-mailencryptionscheme.Itprovidessecurityservicessuchasprivacy,senderauthentication,messageintegrityandnon-repudiation.Alongwiththesesecurityservices,italsoprovidesdatacompressionandkeymanagementsupport.MeasurestoProtectComputerSecurity4

Securityexpertsareconstantlydevisingwaystoprotectcomputersystemsfromaccessbyunauthorizedpersons.Sometimessecurityisamatterofputtingguardsoncompanycomputerroomsandcheckingtheidentificationofeveryoneadmitted.Oftentimesitisamatterofbeingcarefulaboutassigningpasswordstopeopleandofchangingthemwhenpeopleleaveacompany.Passwordsaresecretwordsornumbersthatmustbekeyedintoacomputersystemtogainaccess.Insome“dial-back”computersystems,theusertelephonesthecomputer,punchesinthecorrectpassword,andhangsup.Thecomputerthencallsbackatacertainpreauthorizednumber.01020304RestrictingAccessMeasurestoProtectComputerSecurity4

Mostmajorcorporationstodayusespecialhardwareandsoftwarecalledfirewallstocontrolaccesstotheirinternalcomputernetworks.Thesefirewallsactasasecuritybufferbetweenthecorporation'sprivatenetworkandallexternalnetworks,includingtheInternet.Alldatapacketsenteringorleavingtheinternalnetworkpassthroughthefirewall,whichexamineseachpacketandblocksthosethatdonotmeetthespecifiedsecuritycriteria.Firewalliscategorizedintothreebasictypes:packetfiltering,applicationgatewaysandcircuit-levelgateways.01020304RestrictingAccessMeasurestoProtectComputerSecurity4PacketfilteringisatechniquewherebyroutershaveACL(AccessControlLists,atableofpacketfilterrules).Bydefault,arouterwillpassalltrafficsenttoit,andwilldosowithoutanysortofrestrictions.EmployingACLsisamethodforenforcingasecuritypolicywithregardtowhatsortsofaccessusersallowtheoutsideworldtohavetousers'owninternalnetwork,andviceversa.[4]Packetsbelongingtoexistingconnectionsarecomparedtothefirewall'sstatetableofopenconnections,anddecisiontoalloworblockistaken.Thisprocesssavestimeandprovidesaddedsecurityaswell.Nopacketisallowedtotrespassthefirewallunlessitbelongstoalreadyestablishedconnection.01020304RestrictingAccessMeasurestoProtectComputerSecurity401020304RestrictingAccess

Anapplicationgateway(sometimesknownasaproxygateway),actsasarelaynodefortheapplication-leveltraffic,asshowninFigure9-1.Theyinterceptincomingandoutgoingpackets,runproxiesthatcopyandforwardinformationacrossthegateway,andfunctionasaproxyserver,preventinganydirectconnectionbetweenatrustedserverorclientandanuntrustedhost.

MeasurestoProtectComputerSecurity401020304RestrictingAccess

Theproxiesareapplicationspecific.TheycanfilterpacketsattheapplicationlayeroftheOSImodel.

Anapplication-specificproxyacceptspacketsgeneratedbyonlyspecifiedapplicationforwhichtheyaredesignedtocopy,forward,andfilter.Forexample,onlyaTelnetproxycancopy,forward,andfilterTelnettraffic.

Ifanetworkreliesonlyonanapplication-levelgateway,incomingandoutgoingpacketscannotaccessservicesthathavenoproxiesconfigured.Forexample,ifagatewayrunsFTPandTelnetproxies,onlypacketsgeneratedbytheseservicescanpassthroughthefirewall.Allotherservicesareblocked.Applicationgatewayscanrestrictspecificactionsfrombeingperformed.Forexample,thegatewaycouldbeconfiguredtopreventusersfromperformingthe“ftp_put”[5]command.Thiscanpreventmodificationoftheinformationstoredontheserverbyanattacker.MeasurestoProtectComputerSecurity401020304RestrictingAccess

Thecircuit-levelgatewayisanintermediatesolutionbetweenthepacketfilterandtheapplicationgateway.Itrunsatthetransportlayerandhencecanactasproxyforanyapplication.Similartoanapplicationgateway,thecircuit-levelgatewayalsodoesnotpermitanend-to-endTCPconnectionacrossthegateway.ItsetsuptwoTCPconnectionsandrelaystheTCPsegmentsfromonenetworktotheother,butitdoesnotexaminetheapplicationdatalikeapplicationgateway.MeasurestoProtectComputerSecurity401020304AnticipatingDisasters

Thedisadvantageistheslowencryptionanddecryptionprocess.AlmostallencryptionschemesusedintheInternetusesasymmetricencryptionforexchangingthesymmetricencryptionkey,andsymmetricencryptionforbetterperformance.Businesseshavebeenencryptingmessagesforyears.Individualsarealsousingencryptingprogramstosafeguardtheirprivatecommunications.OneofthemostwidelyusedpersonalencryptionprogramsisPrettyGoodPrivacy(PGP).PGPisanE-mailencryptionscheme.Itprovidessecurityservicessuchasprivacy,senderauthentication,messageintegrityandnon-repudiation.Alongwiththesesecurityservices,italsoprovidesdatacompressionandkeymanagementsupport.MeasurestoProtectComputerSecurity401020304Backup

Equipmentcanalwaysbereplaced.Data,however,maybeirreplaceable.Mostcompanieshavewaysoftryingtokeepsoftwareanddatafrombeingtamperedwithinthefirstplace.Theyincludecarefulscreeningofjobapplicants,guardingofpasswords,andauditingofdataandprogramsfromtimetotime.Thesafestprocedure,however,istomakefrequentbackupsofdataandtostoretheminremotelocations.5MalwareMalware5Malware,shortformalicioussoftware,isanysoftwareusedtodisruptcomputeroperations,gathersensitiveinformation,gainaccesstoprivatecomputersystems,ordisplayunwantedadvertising.Beforethetermmalwarewascoinedin1990,malicioussoftwarewasreferredtoascomputerviruses.Malwareisdefinedbyitsmaliciousintent,actingagainsttherequirementsofthecomputeruser,anddoesnotincludesoftwarethatcausesunintentionalharmduetosomedeficiency.

Malwarecanbedividedintotwocategories:thosethatneedahostprogram,andthosethatareindependent.Theformer,referredtoasparasitic,areessentiallyfragmentsofprogramsthatcannotexistindependentlyofsomeactualapplicationprogram,utilityorsystemprogram.Virusesandlogicbombsareexamples.Thelatterareself-containedprogramsthatcanbescheduledandrunbytheoperationsystem.Wormsandbotprogramsareexamples.1TypesofMalwareMalware51.VirusComputervirusesareself-replicatingprogramsdeliberatelydesignedtointerferewithcomputeroperation,record,corrupt,ordeletedata,orspreadthemselvestoothercomputersandthroughouttheInternet.Theyfirstappearedintheearly1980s,andthetermitselfwascoinedin1983.Whenthecodeofavirusisexecuted,itspreadsitselftootherprograms.Atypicalcomputervirusdoestwothings.First,itcopiesitselfintopreviouslyuninfectedprograms.Second,itexecutesotherinstructionsthattheviruscreatorhasincludedinit.Whenevertheinfectedcomputercomesintocontactwithanuninfectedpieceofsoftware,afreshcopyoftheviruspassesintothenewprogram.Thus,theinfectioncanbespreadfromcomputertocomputerbyunsuspectinguserswhoeitherswapdisksorsendprogramstooneanotheroveranetwork.Inanetworkenvironment,theabilitytoaccessapplicationsandsystemservicesonothercomputerprovidesaperfectconditionforthespreadofavirus.Malware5

Muchlikehumanviruses,computervirusescanrangeinvariety.Somevirusescauseonlymildlyannoyingeffectswhileotherscandamagesoftwareorfiles.Theyoftenslowthingsdownandcauseotherproblemsintheprocess.Malware52.Worm

Awormissimilartoavirusbyitsdesign,andisconsideredtobeasub-classofavirus.Wormsspreadfromcomputertocomputer,butunlikeavirus,ithasthecapabilitytotravelwithoutanyhelp.Awormtakesadvantageoffileorinformationtransportfeaturesonthesystem,whichallowsittotravelunaided.Thebiggestdangerwithawormisitscapabilitytoreplicateitselfonthecomputersystem.Forexample,awormcansendacopyofitselftoeveryonelistedinusers'E-mailaddressbook.Duetoitscopyingnatureandcapabilitytotravelacrossnetworks,theendresultinmostcasesisthatthewormconsumestoomuchsystemmemoryornetworkbandwidth,causingWebservers,networkserversandindividualcomputerstostopresponding.[7]Malware5

3.TrojanHorseATrojanhorseisfullofasmuchtrickeryasthemythological“TrojanHorse”itwasnamedafter.Unlikevirusesandworms,Trojanhorsesdonotreproducebyinfectingotherfilesnordotheyself-replicating.TheTrojanhorse,atfirstglancewillappeartobeusefulsoftwarebutwillactuallydodamageonceinstalledorrunonthecomputer.ThoseonthereceivingendofaTrojanhorseareusuallytrickedintoopeningthembecausetheyappeartobereceivinglegitimatesoftwareorfilesfromalegitimatesource.WhenaTrojanhorseisactivatedonthecomputer,theresultscanvary.SomeTrojansaredesignedtobemoreannoyingthanmaliciousortheycancauseseriousdamagebydeletingfilesanddestroyinginformationonthesystem.Trojansarealsoknowntocreateabackdooronthecomputerthatgivesmalicioususersaccesstothesystem,possiblyallowingconfidentialorpersonalinformationtobecompromised.Malware54.LogicBomb

Thelogicbombisoneoftheoldesttypesofprogramthreat.Itisapieceofcodeintentionallyembeddedinasoftwaresystemthatissetto“explode”whenspecifiedconditionsaremet.Examplesofsuchconditionsthatcanbeusedastriggersforalogicbombarepresenceorabsenceofcertainfiles,aparticulardayoftheweekordate,oraparticularuserrunningtheapplication.Oncetriggered,abombmayalterordeletedataorentirefiles,causeamachinehalt,ordosomeotherdamage.Malware55.Bot

Abot,alsoknownasazombieordrone,isaprogramthatsecretlytakesoveranotherInternet-attachedcomputerandthenusesthatcomputertolaunchattacksthataredifficulttotracetothebot'screator.Thebotistypicallyplantedonhundredsorthousandsofcomputersbelongingtounsuspectingthirdparties.Thecollectionofbotsofteniscapableofactinginacoordinatedmanner;suchacollectionisreferredtoasabotnet.BotnetshavebeenusedmanytimestosendspamE-mailorparticipateindistributeddenial-of-serviceattacks.Theyareincreasinglyrentedoutbycybercriminalsascommoditiesforavarietyofpurposes.Malware56.Blended-ThreatMalware

Ablendedthreatisasophisticatedattackthatbundlessomeoftheworstaspectsofviruses,worms,Trojanhorsesandmaliciouscodeintoonethreat.BlendedthreatsuseserverandInternetvulnerabilitiestoinitiate,transmitandspreadanattack.Thiscombinationofmethodandtechniquesmeansblendedthreatscanspreadquicklyandcausewidespreaddamage.AnexampleofablendedattackistheNimdaattack[8],whichusesfourdistributionmethods:E-mail,Windowsshares,Webservers,andWebclients.Blendedthreatsareconsideredtobetheworstrisktosecuritysincetheinceptionofviruses,asmostblendedthreatsrequirenohumaninterventiontospread.Malware5

Tocombatmalware,thefirststepistomakesurethatthecomputer'soperatingsystemisup-to-date.Thelatestversionoftheoperatingsystemwillrestoretheexistingbugsandhencestrengthenthesystem'scapabilitytoresistpotentialmalware.Thesecondstepistoinstallanti-virussoftware.Mostoftoday'santi-virussoftwareisdesignedtocombatawiderangeofthreats,includingallmalwarewementionedabove.Theycanidentify,neutralizeoreveneliminatemalwarebyusingtwoapproaches.Thefirstapproachisexaminingorscanningfilestolookforknownvirusesmatchingdefinitioninavirusdictionary.Thesecondisidentifyingsuspiciousbehaviorfromanycomputerprogramwhichmightindicateinfection.Mostcommercialanti-virussoftwareusesbothoftheseapproaches,withanemphasisonthevirusdictionaryapproach.2CombatingMalwareMalware5

Additionally,installingafirewallisofgreatnecessitytocombatmalware.Aswementionedpreviously,afirewallcanbeeitherhardwareorsoftware.Hardwarefirewallsprovideastrongdegreeofprotectionfrommostformsofattackcomingfromtheoutsideworldandcanbepurchasedasastand-aloneproductorinbroadbandrouters.Unfortunately,whenbattlingviruses,wormsandTrojans,ahardwarefirewallmaybelesseffectivethanasoftwarefirewall,asitcouldpossiblyignoreembeddedwormsinoutgoingE-mailsandseethisasregularnetworktraffic.Forindividualhomeusers,themostpopularfirewall

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论