版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1/10计算机网络技术基础论文络中存在着各种各样的安全漏洞和威胁。从广义息的性、完整性、可用性、真实性和可控性的到破坏、更改、泄露,系统连续可靠正常地运行.防止和传播后的后果,本质上是维护道德、法规或国家利是保护用户的利益和隐私网络安全与其所保护的信息计算机、网络、密码技术和信息安全技术,保护在和存储的信息的性、完整性和真实性.并对信息的传播算机网络安全机制分析管理程序以与它们的任意组合.2/10充、路由控制、公证等。安全性服务和安全性以是性服务的成分.而且还可以是完整性和鉴别服务的。数字签名可以用于鉴别服务,也可以通常的安全性经历是通过使用口令来实现访问控来对身份进行鉴别。在获得对数据的访问权之前.通以满足安全性要求。问卷与口令有很近的亲缘关系.措施信息安全防措施.是保证网络信息原理是利用一定的加密算法.将明文转换成为获取和理解原始数据起到了很好的阻止作3/10进行破坏以与确定发信人的身份.我标志通讯各方身份的一系列数据.它要接收端的公钥.把一个对称通信密信封只有指定的接收方才可以用自己的私钥己经成为现代社会的一个重要特征。信息本、就是生产力。因此.各国开始利用电子空间网络的技术的不断更新.单一的安全防护策略则统的概念未来的计算机网络安全防护策略方4/10不断的去探索,争取赶上发达国家的水平.保障我AbstractWhenmankindenteredthe1stcenturyinformationsociety,thenetworksocietyofthetimeChinawillestablishacompletesetofnetworksecuritysystemespeciallyfromthepolicyandlawtoestablishChinasowncharacteristics,networksecuritysystem.worksecuritypreventationcanhelpgroupsorindividualssothattheybenefitfromthesameinformationcanalsobeusedtoposeathreattothem,seddamageThereforenetworksecurityincludingthecompositionofworkhardwaresoftwareandnetworktransmissionofinformationsecuritysothattheydonotbecauseofaccidentalormaliciousdestructionoftheattacksnetworksecuritynotonlythetechnicalaspectsbutalsomanagementissues,bothcomplementeachother,areindispensable.rnetworksecurityStandardizationofcomputersecurityisdefined5/10oestablishadataprocessingsystemandtheadoptionoftechnologyandmanagementofsecurityprotectiontheprotectionofcomputerhardware,softwaredataisnotduetoaccidentalandmaliciousdestructionofreasons,changeandleakageTheabovedefinitionofcomputersecurityincludesphysicalsecurityandlogicalsecurityofboththecontentsofthecontentsofthelogicofsecuritycouldbeunderstoodasweoftensaythattheinformationsecurityinformationreferstotheconfidentiality,integrityandavailabilityofprotectionandnetworksecurityInformationsecurityisthemeaningoftheextensionthatnetworksecurityisanetworkofinformationconfidentiality,integrityandavailabilityprotectionComputernetworksecurityasthespecificmeaningoftheuserchangestheuserisdifferentonthenetworksecurityawarenessandrequirementswillbedifferent.Fromtheordinaryuser'spointofviewcouldonlyhopethatpersonalprivacyorconfidentialinformationtransmissiononthenetworkbeprotectedagainsteavesdropping,tamperingandforgeryandnetworkproviderinadditiontocareaboutthesenetworkinformationsecuritywemustalsoconsiderhowtodealwithsuddennaturaldisasterssuchasmilitarystrikesagainstthedestructionofnetworkhardware,aswellasunusualinthenetworkhowtorestorenetworkcommunications,andmaintainthecontinuityofnetworkcommunications.yincludingthecompositionofnetworkhardwaresoftwareandnetworktransmissionofinformationsecurity,sothattheydonotbecauseofaccidentalormaliciousattacksonthedestructionof6/10hnicalaspectsofnetworksecurityissuestherearemanagementidescomplementeachotherareindispensableManmadeonandattacksmakesnetworksecurityisfacingnewchallengesputernetworksecuritystatusquoetworksecurityisthenetworkhardwaresoftwareanddatasystemsareprotectedfromaccidentalormaliciousdestructionofreasons,alterationdisclosurethesystemcontinuous,reliable,normaloperationofnetworkserviceswithoutdisruptionComputerandnetworktechnologyhasthecomplexityanddiversitymakescomputerandnetworksecurityhasbecomeaneedtocontinuetoupdateandimprovethearea.Atpresent,hackersmethodhasbeenmorethanthetypeofcomputervirus,andmanyattacksarefatal.IntheInternetnetworkbecausetheInternetdoesnothavethetimeandgeographicalconstraintswheneverthereisameanstogeneratenewattacks,wecaninaweekaroundtheworld,theseattacksmeanstheuseofnetworkandsystemvulnerabilitiestoattackcomputersystemsandresultinginnetworkparalysisWormsbackdoor(Back-doors),Rootkits,DOS(DenialofServices)andSniffernetworkmonitor)isafamiliarmeansofseveralhackerattacks.HowevernoneoftheseattacksmeanstheyreflecttheastonishingpoweroftodaybecomeworseThesetypesofattacksmeansthenewvariant,withpreviousattacksappearedmethodsmoreintelligent,targetedagainstInternetbasedprotocolsandoperatingsystemlevel.FromtheWebprocess7/10trolprocedurestothekernellevelRootletsHackerspracticesescalatingeusersabilitytoguardagainstinformationsecuritychallengeirdcomputernetworksecurityprecautionstworkmanagementandtheuseofsafetyawarenessamongstaffmanycomputersystemscommonlyusedpasswordstocontrolaccesstosystemresources,whichisanti-virusprocess,themostvulnerableandthemosteconomicalmethods.Networkadministratorandterminaloperatorprivilegesinaccordancewiththeirresponsibilities,chooseadifferentpasswordfortheapplicationdatalegitimateoperation,topreventunauthorizeduserstoaccessthedataandtheuseofnetworkresources.Onthenetworksoftwareinstallationandmanagementiscrucial,itisnotonlyrelatedtonetworkmaintenanceandmanagementefficiencyandquality,butalsotothenetworksecurity.AgoodantivirussoftwarecanbeeasilyinstalledwithinminutestotheorganizationeachNTservercanalsobedownloadedandspreadtoallthepurposeofthemachinebythenetworkadministratorsetupandmanagetofocus,itwillworkwiththeoperatingsystemandothersecurityiscloselylinkedtobecomeapartofnetworksecuritymanagement,andautomaticallyprovidethebestnetworkvirusdefensivemeasures.Whenthecomputervirusonlineresourcesapplicationsattack,suchasthevirusexistsintheinformation-sharingnetworkofmedia,itisnecessarytothesecurityatthegateway,onthenetworkfront-endforantivirus.8/10irewalltechnologynthenetworkaccesscontroltopreventtheexternalnetworkuserstoillegalmeanstoentertheexternalnetworkthroughtheinternalnetworkaccessinternalnetworkresourcesandprotecttheinternalnetworkoperatingenvironmentspecialforNetworkInterconnectionDevicesItisbetweentwoormorenetworkssuchaspackettransmissionlinkinaccordancewithacertaindegreeofsecuritystrategytoimplementtheinspectiontodeterminewhetherthenetworkcommunicationbetweenareallowedtoandmonitorthenetworkrunning.Althoughthefirewallistoprotectthenetworkfromaneffectivemeansofhacking,butthereareobviouslyinadequatethroughthefirewallcannotprotectagainstoutsideattackothermeanscannotpreventdefectorsfromtheinsideandinadvertentthreatsposedbyusersbutalsocannotcompletelypreventthetransmissionofthevirushavebeeninfectedwiththesoftwareordocuments,andcannotprotectagainstdata-drivenattacks.yencryptiontechnologyrtheglobalecommercetoprovideaguaranteesothatInternetbasedelectronictradingsystemhasbecomepossible,thusimprovingthesymmetricencryptionandasymmetricencryptiontechnologyisstillthemainstreamofthe1stcentury.Symmetricencryptiontotheconventionalpasswordbasedtechnologycomputingencryptionanddecryptionoperationsusethesamekey.Asymmetricencryption,encryption9/10sdifferentfromthedecryptionkeyencryptionkeysaremadepublicanyonecanuse,onlythedecryptionkeytodecryptpeopleknow.thenetworkhostoperatingsystemsecurityandphysicalsecuritymeasuresNetworkfirewallasthefirstlineofdefenseandcannotfullyprotecttheinternalnetworkmustbecombinedwithothermeasurestoimprovethesafetyofthesystemlevelAfterthefirewallisbasedonthenetworkhostoperatingsystemsecurityandphysicalsecuritymeasuresInaccordancewiththelevelfromlowtohighnamelythephysicalsecurityofthehostsystem,thecoreoperatingsystemsecuritysystemsecurityapplicationservicessecurityandfilesystemsecurityAtthesametimehostsecuritychecksandbugfixes,aswellasabackupsafetysystemasasupplementarysafetymeasures.Theseconstitutetheentirenetworksystemthesecondlineofdefense,themainpartofabreakthroughtopreventthefirewallaswellasattacksfromwithin.Systembackupisthelastlineofdefensenetworksystem,usedtoattackaftertheSystemRestoreThefirewallandhostsecuritymeasuresistheoverallsystemsecuritybyauditingintrusiondetectionandresponseprocessorconstitutetheoverallsafetyinspectionandresponsemeasuresItfromthenetworksystemfirewallnetworkhostorevendirectlyfromthenetworklinklayerontheextractionofnetworkstatusinformationasinputtotheintrusiondetectionsubsystemIntrusionDetectionSysteminaccordancewithcertainrule
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- DB51T 1490-2020 肉兔商品场建设规范
- DB51T 1145-2010 山苍子播种育苗技术规程
- DB51T 1100-2010 蜂胶生产技术规程
- DB51T 1044-2010 丹参种子种苗质量标准
- 丝巾项目实施方案
- 土工格栅项目可行性研究报告
- 着色剂项目立项申请报告
- 新娘头饰定制课程设计
- 试剂生产加工项目可行性研究报告
- 机械课程设计结语
- 社区矫正知识课件
- (高清版)DZT 0261-2014 滑坡崩塌泥石流灾害调查规范(1:50000)
- 全球及中国光纤偏振器行业市场发展分析及前景趋势与投资发展研究报告2024-2029版
- 手机硬件测试介绍
- T-AII 008-2023 深度学习算法框架通用接口规范
- 商品总监述职报告
- 人教部编版统编版八年级道德与法治上册期末模拟测试卷(含答案解析)
- 述职报告及工作思路(四篇合集)
- 2023-2024学年云南省昆明市盘龙区九年级上学期期末物理试卷及答案
- 家庭局域网组建课件
- 《结构化学》课件
评论
0/150
提交评论