版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
1/10計(jì)算機(jī)網(wǎng)絡(luò)技術(shù)基礎(chǔ)論文絡(luò)中存在著各種各樣的安全漏洞和威脅。從廣義息的性、完整性、可用性、真實(shí)性和可控性的到破壞、更改、泄露,系統(tǒng)連續(xù)可靠正常地運(yùn)行.防止和傳播后的后果,本質(zhì)上是維護(hù)道德、法規(guī)或國家利是保護(hù)用戶的利益和隱私網(wǎng)絡(luò)安全與其所保護(hù)的信息計(jì)算機(jī)、網(wǎng)絡(luò)、密碼技術(shù)和信息安全技術(shù),保護(hù)在和存儲(chǔ)的信息的性、完整性和真實(shí)性.并對(duì)信息的傳播算機(jī)網(wǎng)絡(luò)安全機(jī)制分析管理程序以與它們的任意組合.2/10充、路由控制、公證等。安全性服務(wù)和安全性以是性服務(wù)的成分.而且還可以是完整性和鑒別服務(wù)的。數(shù)字簽名可以用于鑒別服務(wù),也可以通常的安全性經(jīng)歷是通過使用口令來實(shí)現(xiàn)訪問控來對(duì)身份進(jìn)行鑒別。在獲得對(duì)數(shù)據(jù)的訪問權(quán)之前.通以滿足安全性要求。問卷與口令有很近的親緣關(guān)系.措施信息安全防措施.是保證網(wǎng)絡(luò)信息原理是利用一定的加密算法.將明文轉(zhuǎn)換成為獲取和理解原始數(shù)據(jù)起到了很好的阻止作3/10進(jìn)行破壞以與確定發(fā)信人的身份.我標(biāo)志通訊各方身份的一系列數(shù)據(jù).它要接收端的公鑰.把一個(gè)對(duì)稱通信密信封只有指定的接收方才可以用自己的私鑰己經(jīng)成為現(xiàn)代社會(huì)的一個(gè)重要特征。信息本、就是生產(chǎn)力。因此.各國開始利用電子空間網(wǎng)絡(luò)的技術(shù)的不斷更新.單一的安全防護(hù)策略則統(tǒng)的概念未來的計(jì)算機(jī)網(wǎng)絡(luò)安全防護(hù)策略方4/10不斷的去探索,爭取趕上發(fā)達(dá)國家的水平.保障我AbstractWhenmankindenteredthe1stcenturyinformationsociety,thenetworksocietyofthetimeChinawillestablishacompletesetofnetworksecuritysystemespeciallyfromthepolicyandlawtoestablishChinasowncharacteristics,networksecuritysystem.worksecuritypreventationcanhelpgroupsorindividualssothattheybenefitfromthesameinformationcanalsobeusedtoposeathreattothem,seddamageThereforenetworksecurityincludingthecompositionofworkhardwaresoftwareandnetworktransmissionofinformationsecuritysothattheydonotbecauseofaccidentalormaliciousdestructionoftheattacksnetworksecuritynotonlythetechnicalaspectsbutalsomanagementissues,bothcomplementeachother,areindispensable.rnetworksecurityStandardizationofcomputersecurityisdefined5/10oestablishadataprocessingsystemandtheadoptionoftechnologyandmanagementofsecurityprotectiontheprotectionofcomputerhardware,softwaredataisnotduetoaccidentalandmaliciousdestructionofreasons,changeandleakageTheabovedefinitionofcomputersecurityincludesphysicalsecurityandlogicalsecurityofboththecontentsofthecontentsofthelogicofsecuritycouldbeunderstoodasweoftensaythattheinformationsecurityinformationreferstotheconfidentiality,integrityandavailabilityofprotectionandnetworksecurityInformationsecurityisthemeaningoftheextensionthatnetworksecurityisanetworkofinformationconfidentiality,integrityandavailabilityprotectionComputernetworksecurityasthespecificmeaningoftheuserchangestheuserisdifferentonthenetworksecurityawarenessandrequirementswillbedifferent.Fromtheordinaryuser'spointofviewcouldonlyhopethatpersonalprivacyorconfidentialinformationtransmissiononthenetworkbeprotectedagainsteavesdropping,tamperingandforgeryandnetworkproviderinadditiontocareaboutthesenetworkinformationsecuritywemustalsoconsiderhowtodealwithsuddennaturaldisasterssuchasmilitarystrikesagainstthedestructionofnetworkhardware,aswellasunusualinthenetworkhowtorestorenetworkcommunications,andmaintainthecontinuityofnetworkcommunications.yincludingthecompositionofnetworkhardwaresoftwareandnetworktransmissionofinformationsecurity,sothattheydonotbecauseofaccidentalormaliciousattacksonthedestructionof6/10hnicalaspectsofnetworksecurityissuestherearemanagementidescomplementeachotherareindispensableManmadeonandattacksmakesnetworksecurityisfacingnewchallengesputernetworksecuritystatusquoetworksecurityisthenetworkhardwaresoftwareanddatasystemsareprotectedfromaccidentalormaliciousdestructionofreasons,alterationdisclosurethesystemcontinuous,reliable,normaloperationofnetworkserviceswithoutdisruptionComputerandnetworktechnologyhasthecomplexityanddiversitymakescomputerandnetworksecurityhasbecomeaneedtocontinuetoupdateandimprovethearea.Atpresent,hackersmethodhasbeenmorethanthetypeofcomputervirus,andmanyattacksarefatal.IntheInternetnetworkbecausetheInternetdoesnothavethetimeandgeographicalconstraintswheneverthereisameanstogeneratenewattacks,wecaninaweekaroundtheworld,theseattacksmeanstheuseofnetworkandsystemvulnerabilitiestoattackcomputersystemsandresultinginnetworkparalysisWormsbackdoor(Back-doors),Rootkits,DOS(DenialofServices)andSniffernetworkmonitor)isafamiliarmeansofseveralhackerattacks.HowevernoneoftheseattacksmeanstheyreflecttheastonishingpoweroftodaybecomeworseThesetypesofattacksmeansthenewvariant,withpreviousattacksappearedmethodsmoreintelligent,targetedagainstInternetbasedprotocolsandoperatingsystemlevel.FromtheWebprocess7/10trolprocedurestothekernellevelRootletsHackerspracticesescalatingeusersabilitytoguardagainstinformationsecuritychallengeirdcomputernetworksecurityprecautionstworkmanagementandtheuseofsafetyawarenessamongstaffmanycomputersystemscommonlyusedpasswordstocontrolaccesstosystemresources,whichisanti-virusprocess,themostvulnerableandthemosteconomicalmethods.Networkadministratorandterminaloperatorprivilegesinaccordancewiththeirresponsibilities,chooseadifferentpasswordfortheapplicationdatalegitimateoperation,topreventunauthorizeduserstoaccessthedataandtheuseofnetworkresources.Onthenetworksoftwareinstallationandmanagementiscrucial,itisnotonlyrelatedtonetworkmaintenanceandmanagementefficiencyandquality,butalsotothenetworksecurity.AgoodantivirussoftwarecanbeeasilyinstalledwithinminutestotheorganizationeachNTservercanalsobedownloadedandspreadtoallthepurposeofthemachinebythenetworkadministratorsetupandmanagetofocus,itwillworkwiththeoperatingsystemandothersecurityiscloselylinkedtobecomeapartofnetworksecuritymanagement,andautomaticallyprovidethebestnetworkvirusdefensivemeasures.Whenthecomputervirusonlineresourcesapplicationsattack,suchasthevirusexistsintheinformation-sharingnetworkofmedia,itisnecessarytothesecurityatthegateway,onthenetworkfront-endforantivirus.8/10irewalltechnologynthenetworkaccesscontroltopreventtheexternalnetworkuserstoillegalmeanstoentertheexternalnetworkthroughtheinternalnetworkaccessinternalnetworkresourcesandprotecttheinternalnetworkoperatingenvironmentspecialforNetworkInterconnectionDevicesItisbetweentwoormorenetworkssuchaspackettransmissionlinkinaccordancewithacertaindegreeofsecuritystrategytoimplementtheinspectiontodeterminewhetherthenetworkcommunicationbetweenareallowedtoandmonitorthenetworkrunning.Althoughthefirewallistoprotectthenetworkfromaneffectivemeansofhacking,butthereareobviouslyinadequatethroughthefirewallcannotprotectagainstoutsideattackothermeanscannotpreventdefectorsfromtheinsideandinadvertentthreatsposedbyusersbutalsocannotcompletelypreventthetransmissionofthevirushavebeeninfectedwiththesoftwareordocuments,andcannotprotectagainstdata-drivenattacks.yencryptiontechnologyrtheglobalecommercetoprovideaguaranteesothatInternetbasedelectronictradingsystemhasbecomepossible,thusimprovingthesymmetricencryptionandasymmetricencryptiontechnologyisstillthemainstreamofthe1stcentury.Symmetricencryptiontotheconventionalpasswordbasedtechnologycomputingencryptionanddecryptionoperationsusethesamekey.Asymmetricencryption,encryption9/10sdifferentfromthedecryptionkeyencryptionkeysaremadepublicanyonecanuse,onlythedecryptionkeytodecryptpeopleknow.thenetworkhostoperatingsystemsecurityandphysicalsecuritymeasuresNetworkfirewallasthefirstlineofdefenseandcannotfullyprotecttheinternalnetworkmustbecombinedwithothermeasurestoimprovethesafetyofthesystemlevelAfterthefirewallisbasedonthenetworkhostoperatingsystemsecurityandphysicalsecuritymeasuresInaccordancewiththelevelfromlowtohighnamelythephysicalsecurityofthehostsystem,thecoreoperatingsystemsecuritysystemsecurityapplicationservicessecurityandfilesystemsecurityAtthesametimehostsecuritychecksandbugfixes,aswellasabackupsafetysystemasasupplementarysafetymeasures.Theseconstitutetheentirenetworksystemthesecondlineofdefense,themainpartofabreakthroughtopreventthefirewallaswellasattacksfromwithin.Systembackupisthelastlineofdefensenetworksystem,usedtoattackaftertheSystemRestoreThefirewallandhostsecuritymeasuresistheoverallsystemsecuritybyauditingintrusiondetectionandresponseprocessorconstitutetheoverallsafetyinspectionandresponsemeasuresItfromthenetworksystemfirewallnetworkhostorevendirectlyfromthenetworklinklayerontheextractionofnetworkstatusinformationasinputtotheintrusiondetectionsubsystemIntrusionDetectionSysteminaccordancewithcertainrule
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 高考物理總復(fù)習(xí)專題十二機(jī)械振動(dòng)光學(xué)第4講光的波動(dòng)性、電磁波練習(xí)含答案
- 果蔬生鮮供應(yīng)合約
- 吉林省通化市外國語學(xué)校九年級(jí)化學(xué)上冊(cè) 第二單元 活動(dòng)1 氧氣的實(shí)驗(yàn)室制取與性質(zhì)教案 (新版)新人教版
- 二年級(jí)道德與法治上冊(cè) 第三單元 1《我愛秋天》教案2 浙教版
- 高中數(shù)學(xué) 第三章 指數(shù)函數(shù)、對(duì)數(shù)函數(shù)和冪函數(shù) 3.1.1 分?jǐn)?shù)指數(shù)冪(2)教案 蘇教版必修1
- 2024-2025學(xué)年新教材高中英語 Unit 1 Knowing me Knowing you泛讀 技能初養(yǎng)成教案 外研版必修第三冊(cè)
- 2024-2025學(xué)年八年級(jí)物理下冊(cè) 第十一章 功和機(jī)械能 第1節(jié) 功教案 (新版)新人教版
- 高中語文 第7課 李清照詞兩首-聲聲慢教案2 新人教版必修4
- 2023七年級(jí)地理上冊(cè) 第三章 天氣與氣候 第一節(jié) 多變的天氣說課稿 (新版)新人教版
- 文書模板-買賣合同的構(gòu)成要素
- 業(yè)務(wù)居間合同范本2024年
- 員工入股退股合同范例
- 2024年xx村10月駐村工作總結(jié)
- 手機(jī)游戲獨(dú)家代理協(xié)議模板
- 【浙江卷】浙江省2024學(xué)年第一學(xué)期杭州市2025屆高三年級(jí)教學(xué)質(zhì)量檢測(杭州一模)(11.4-11.6)英語試卷
- 小學(xué)語文深度教學(xué)心得體會(huì)范文(31篇)
- 2023年隴南康縣招聘專職社區(qū)工作者考試真題
- 2024年審計(jì)工作總結(jié)(六篇)
- 福建復(fù)旦大學(xué)附屬中山醫(yī)院廈門醫(yī)院招聘編外真題
- 化 學(xué)二氧化碳的實(shí)驗(yàn)室制取課件-2024-2025學(xué)年九年級(jí)化學(xué)人教版上冊(cè)
- 中國在線親子游行業(yè)產(chǎn)業(yè)鏈全景圖譜、領(lǐng)先企業(yè)分析及投資前景預(yù)測報(bào)告
評(píng)論
0/150
提交評(píng)論