計(jì)算機(jī)網(wǎng)絡(luò)技術(shù)基礎(chǔ)論文正稿_第1頁
計(jì)算機(jī)網(wǎng)絡(luò)技術(shù)基礎(chǔ)論文正稿_第2頁
計(jì)算機(jī)網(wǎng)絡(luò)技術(shù)基礎(chǔ)論文正稿_第3頁
計(jì)算機(jī)網(wǎng)絡(luò)技術(shù)基礎(chǔ)論文正稿_第4頁
計(jì)算機(jī)網(wǎng)絡(luò)技術(shù)基礎(chǔ)論文正稿_第5頁
已閱讀5頁,還剩11頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡介

1/10計(jì)算機(jī)網(wǎng)絡(luò)技術(shù)基礎(chǔ)論文絡(luò)中存在著各種各樣的安全漏洞和威脅。從廣義息的性、完整性、可用性、真實(shí)性和可控性的到破壞、更改、泄露,系統(tǒng)連續(xù)可靠正常地運(yùn)行.防止和傳播后的后果,本質(zhì)上是維護(hù)道德、法規(guī)或國家利是保護(hù)用戶的利益和隱私網(wǎng)絡(luò)安全與其所保護(hù)的信息計(jì)算機(jī)、網(wǎng)絡(luò)、密碼技術(shù)和信息安全技術(shù),保護(hù)在和存儲(chǔ)的信息的性、完整性和真實(shí)性.并對(duì)信息的傳播算機(jī)網(wǎng)絡(luò)安全機(jī)制分析管理程序以與它們的任意組合.2/10充、路由控制、公證等。安全性服務(wù)和安全性以是性服務(wù)的成分.而且還可以是完整性和鑒別服務(wù)的。數(shù)字簽名可以用于鑒別服務(wù),也可以通常的安全性經(jīng)歷是通過使用口令來實(shí)現(xiàn)訪問控來對(duì)身份進(jìn)行鑒別。在獲得對(duì)數(shù)據(jù)的訪問權(quán)之前.通以滿足安全性要求。問卷與口令有很近的親緣關(guān)系.措施信息安全防措施.是保證網(wǎng)絡(luò)信息原理是利用一定的加密算法.將明文轉(zhuǎn)換成為獲取和理解原始數(shù)據(jù)起到了很好的阻止作3/10進(jìn)行破壞以與確定發(fā)信人的身份.我標(biāo)志通訊各方身份的一系列數(shù)據(jù).它要接收端的公鑰.把一個(gè)對(duì)稱通信密信封只有指定的接收方才可以用自己的私鑰己經(jīng)成為現(xiàn)代社會(huì)的一個(gè)重要特征。信息本、就是生產(chǎn)力。因此.各國開始利用電子空間網(wǎng)絡(luò)的技術(shù)的不斷更新.單一的安全防護(hù)策略則統(tǒng)的概念未來的計(jì)算機(jī)網(wǎng)絡(luò)安全防護(hù)策略方4/10不斷的去探索,爭取趕上發(fā)達(dá)國家的水平.保障我AbstractWhenmankindenteredthe1stcenturyinformationsociety,thenetworksocietyofthetimeChinawillestablishacompletesetofnetworksecuritysystemespeciallyfromthepolicyandlawtoestablishChinasowncharacteristics,networksecuritysystem.worksecuritypreventationcanhelpgroupsorindividualssothattheybenefitfromthesameinformationcanalsobeusedtoposeathreattothem,seddamageThereforenetworksecurityincludingthecompositionofworkhardwaresoftwareandnetworktransmissionofinformationsecuritysothattheydonotbecauseofaccidentalormaliciousdestructionoftheattacksnetworksecuritynotonlythetechnicalaspectsbutalsomanagementissues,bothcomplementeachother,areindispensable.rnetworksecurityStandardizationofcomputersecurityisdefined5/10oestablishadataprocessingsystemandtheadoptionoftechnologyandmanagementofsecurityprotectiontheprotectionofcomputerhardware,softwaredataisnotduetoaccidentalandmaliciousdestructionofreasons,changeandleakageTheabovedefinitionofcomputersecurityincludesphysicalsecurityandlogicalsecurityofboththecontentsofthecontentsofthelogicofsecuritycouldbeunderstoodasweoftensaythattheinformationsecurityinformationreferstotheconfidentiality,integrityandavailabilityofprotectionandnetworksecurityInformationsecurityisthemeaningoftheextensionthatnetworksecurityisanetworkofinformationconfidentiality,integrityandavailabilityprotectionComputernetworksecurityasthespecificmeaningoftheuserchangestheuserisdifferentonthenetworksecurityawarenessandrequirementswillbedifferent.Fromtheordinaryuser'spointofviewcouldonlyhopethatpersonalprivacyorconfidentialinformationtransmissiononthenetworkbeprotectedagainsteavesdropping,tamperingandforgeryandnetworkproviderinadditiontocareaboutthesenetworkinformationsecuritywemustalsoconsiderhowtodealwithsuddennaturaldisasterssuchasmilitarystrikesagainstthedestructionofnetworkhardware,aswellasunusualinthenetworkhowtorestorenetworkcommunications,andmaintainthecontinuityofnetworkcommunications.yincludingthecompositionofnetworkhardwaresoftwareandnetworktransmissionofinformationsecurity,sothattheydonotbecauseofaccidentalormaliciousattacksonthedestructionof6/10hnicalaspectsofnetworksecurityissuestherearemanagementidescomplementeachotherareindispensableManmadeonandattacksmakesnetworksecurityisfacingnewchallengesputernetworksecuritystatusquoetworksecurityisthenetworkhardwaresoftwareanddatasystemsareprotectedfromaccidentalormaliciousdestructionofreasons,alterationdisclosurethesystemcontinuous,reliable,normaloperationofnetworkserviceswithoutdisruptionComputerandnetworktechnologyhasthecomplexityanddiversitymakescomputerandnetworksecurityhasbecomeaneedtocontinuetoupdateandimprovethearea.Atpresent,hackersmethodhasbeenmorethanthetypeofcomputervirus,andmanyattacksarefatal.IntheInternetnetworkbecausetheInternetdoesnothavethetimeandgeographicalconstraintswheneverthereisameanstogeneratenewattacks,wecaninaweekaroundtheworld,theseattacksmeanstheuseofnetworkandsystemvulnerabilitiestoattackcomputersystemsandresultinginnetworkparalysisWormsbackdoor(Back-doors),Rootkits,DOS(DenialofServices)andSniffernetworkmonitor)isafamiliarmeansofseveralhackerattacks.HowevernoneoftheseattacksmeanstheyreflecttheastonishingpoweroftodaybecomeworseThesetypesofattacksmeansthenewvariant,withpreviousattacksappearedmethodsmoreintelligent,targetedagainstInternetbasedprotocolsandoperatingsystemlevel.FromtheWebprocess7/10trolprocedurestothekernellevelRootletsHackerspracticesescalatingeusersabilitytoguardagainstinformationsecuritychallengeirdcomputernetworksecurityprecautionstworkmanagementandtheuseofsafetyawarenessamongstaffmanycomputersystemscommonlyusedpasswordstocontrolaccesstosystemresources,whichisanti-virusprocess,themostvulnerableandthemosteconomicalmethods.Networkadministratorandterminaloperatorprivilegesinaccordancewiththeirresponsibilities,chooseadifferentpasswordfortheapplicationdatalegitimateoperation,topreventunauthorizeduserstoaccessthedataandtheuseofnetworkresources.Onthenetworksoftwareinstallationandmanagementiscrucial,itisnotonlyrelatedtonetworkmaintenanceandmanagementefficiencyandquality,butalsotothenetworksecurity.AgoodantivirussoftwarecanbeeasilyinstalledwithinminutestotheorganizationeachNTservercanalsobedownloadedandspreadtoallthepurposeofthemachinebythenetworkadministratorsetupandmanagetofocus,itwillworkwiththeoperatingsystemandothersecurityiscloselylinkedtobecomeapartofnetworksecuritymanagement,andautomaticallyprovidethebestnetworkvirusdefensivemeasures.Whenthecomputervirusonlineresourcesapplicationsattack,suchasthevirusexistsintheinformation-sharingnetworkofmedia,itisnecessarytothesecurityatthegateway,onthenetworkfront-endforantivirus.8/10irewalltechnologynthenetworkaccesscontroltopreventtheexternalnetworkuserstoillegalmeanstoentertheexternalnetworkthroughtheinternalnetworkaccessinternalnetworkresourcesandprotecttheinternalnetworkoperatingenvironmentspecialforNetworkInterconnectionDevicesItisbetweentwoormorenetworkssuchaspackettransmissionlinkinaccordancewithacertaindegreeofsecuritystrategytoimplementtheinspectiontodeterminewhetherthenetworkcommunicationbetweenareallowedtoandmonitorthenetworkrunning.Althoughthefirewallistoprotectthenetworkfromaneffectivemeansofhacking,butthereareobviouslyinadequatethroughthefirewallcannotprotectagainstoutsideattackothermeanscannotpreventdefectorsfromtheinsideandinadvertentthreatsposedbyusersbutalsocannotcompletelypreventthetransmissionofthevirushavebeeninfectedwiththesoftwareordocuments,andcannotprotectagainstdata-drivenattacks.yencryptiontechnologyrtheglobalecommercetoprovideaguaranteesothatInternetbasedelectronictradingsystemhasbecomepossible,thusimprovingthesymmetricencryptionandasymmetricencryptiontechnologyisstillthemainstreamofthe1stcentury.Symmetricencryptiontotheconventionalpasswordbasedtechnologycomputingencryptionanddecryptionoperationsusethesamekey.Asymmetricencryption,encryption9/10sdifferentfromthedecryptionkeyencryptionkeysaremadepublicanyonecanuse,onlythedecryptionkeytodecryptpeopleknow.thenetworkhostoperatingsystemsecurityandphysicalsecuritymeasuresNetworkfirewallasthefirstlineofdefenseandcannotfullyprotecttheinternalnetworkmustbecombinedwithothermeasurestoimprovethesafetyofthesystemlevelAfterthefirewallisbasedonthenetworkhostoperatingsystemsecurityandphysicalsecuritymeasuresInaccordancewiththelevelfromlowtohighnamelythephysicalsecurityofthehostsystem,thecoreoperatingsystemsecuritysystemsecurityapplicationservicessecurityandfilesystemsecurityAtthesametimehostsecuritychecksandbugfixes,aswellasabackupsafetysystemasasupplementarysafetymeasures.Theseconstitutetheentirenetworksystemthesecondlineofdefense,themainpartofabreakthroughtopreventthefirewallaswellasattacksfromwithin.Systembackupisthelastlineofdefensenetworksystem,usedtoattackaftertheSystemRestoreThefirewallandhostsecuritymeasuresistheoverallsystemsecuritybyauditingintrusiondetectionandresponseprocessorconstitutetheoverallsafetyinspectionandresponsemeasuresItfromthenetworksystemfirewallnetworkhostorevendirectlyfromthenetworklinklayerontheextractionofnetworkstatusinformationasinputtotheintrusiondetectionsubsystemIntrusionDetectionSysteminaccordancewithcertainrule

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論