計算機網(wǎng)絡(luò)安全技術(shù).doc
約17頁DOC格式手機打開展開
計算機網(wǎng)絡(luò)安全技術(shù),全文17頁約15000字論述翔實[摘要]網(wǎng)絡(luò)安全性是一個涉及面很廣泛的問題, 本文從網(wǎng)絡(luò)安全基礎(chǔ)概念入手,對當(dāng)前計算機網(wǎng)絡(luò)中存在的各種安全隱患進(jìn)行了分析,并對由此所帶來的各種黑客攻擊手段著重分析,嚴(yán)峻的安全問題必然帶來與之對應(yīng)的安全防范技術(shù)如:訪問控制,入侵檢測,加密技術(shù),防火墻等...而防火墻技術(shù)是...


內(nèi)容介紹
此文檔由會員 棉花糖糖 發(fā)布
計算機網(wǎng)絡(luò)安全技術(shù)
全文17頁 約15000字 論述翔實
[摘要]網(wǎng)絡(luò)安全性是一個涉及面很廣泛的問題, 本文從網(wǎng)絡(luò)安全基礎(chǔ)概念入手,對當(dāng)前計算機網(wǎng)絡(luò)中存在的各種安全隱患進(jìn)行了分析,并對由此所帶來的各種黑客攻擊手段著重分析,嚴(yán)峻的安全問題必然帶來與之對應(yīng)的安全防范技術(shù)如:訪問控制,入侵檢測,加密技術(shù),防火墻等...而防火墻技術(shù)是本文要主要論述的內(nèi)容.
大多數(shù)安全性問題的出現(xiàn)都是由于有惡意的人試圖獲得某種好處或損害某些人而故意引起的??梢钥闯霰WC網(wǎng)絡(luò)安全不僅僅是使它沒有編程錯誤。它包括要防范那些人為惡意破壞.網(wǎng)絡(luò)安全性可以被粗略地分為4個相互交織的部分:保密、鑒別、反拒認(rèn)以及完整性控制。保密是保護(hù)信息不被未授權(quán)者訪問,這是人們提到的網(wǎng)絡(luò)安全性時最常想到的內(nèi)容。鑒別主要指在揭示敏感信息或進(jìn)行事務(wù)處理之前先確認(rèn)對方的身份。反拒認(rèn)主要與簽名有關(guān)。保密和完整性通過使用注冊過的郵件和文件鎖來實現(xiàn)。
[關(guān)鍵詞] 計算機網(wǎng)絡(luò),網(wǎng)絡(luò)安全,系統(tǒng)漏洞
[Abstract] Security is a broad topic and covers a multitude of sins. I study Network Security from some basic concepts in this paper, for there are lots of potential security problems in computer network and all kinds of invading problems made by hackers, I put weight on these problems. Serious security problems will bring out some security precaution technology, such as visiting control, invading detection, firewall, and firewall technology and IDS is the key of this paper.
Most security problems are intentionally caused by malicious people trying to gain some benefit or harm someone. It should be clear that making a network secure involves some damages made hackers deliberately.
Network security problems can be divided roughly into four intertwined areas: secrecy, authentication, no repudiation, and integrity control. Secrecy has to do with keeping information out of the hands of unauthorized users. This is what usually comes to mind when people think about network security. Authentication deals with determining whom you are talking to before revealing sensitive information or entering into a business deal. No repudiation deals with signatures. Secrecy and integrity are achieved by using registered mail and locking documents up.
[Keywords] Network security Hole of system
目 錄
第一節(jié) 計算機系統(tǒng)安全中的網(wǎng)絡(luò)安全...........................................................................3
1.1.引言...........................................................................................................................3
1.2.計算機系統(tǒng)的安全隱患...........................................................................................3
1.3.網(wǎng)絡(luò)安全的定義與目標(biāo)...........................................................................................4
1.4.計算機網(wǎng)絡(luò)所面臨的威脅.......................................................................................4
第二節(jié) 網(wǎng)絡(luò)安全基礎(chǔ)理論和相關(guān)分析...........................................................................4
2.1.機密性與完整性需求...............................................................................................4
2.2.信任機制和公鑰基礎(chǔ)...............................................................................................5
2.3.鑒別與授權(quán)...............................................................................................................5
第三節(jié) 威脅網(wǎng)絡(luò)安全的攻擊技術(shù)原理...........................................................................6
3.1.黑客技術(shù)概述...........................................................................................................6
3.2.拒絕服務(wù)攻擊 (Denial of Service) .........................................................................6
3.3.緩沖區(qū)溢出攻擊.......................................................................................................7
3.4.網(wǎng)絡(luò)監(jiān)聽攻擊技術(shù)...................................................................................................9
3.5. IP欺騙攻擊..............................................................................................................9
3.6.計算機病毒.............................................................................................................10
3.7. Trojan Horse...........................................................................................................11
第四節(jié) 現(xiàn)有主要安全技術(shù).............................................................................................11
4.1.物理安全措施.........................................................................................................12
4.2.訪問控.....................................................................................................................12
4.3.防火墻技術(shù).............................................................................................................12
4.4.加密技術(shù).................................................................................................................13
4.5 現(xiàn)有安全技術(shù)的不足............................................................................................14
4.6網(wǎng)絡(luò)安全技術(shù)發(fā)展趨勢..........................................................................................14
結(jié)束語...............................................................................................................................16
致謝...................................................................................................................................16
參考文獻(xiàn)...........................................................................................................................17
部分參考文獻(xiàn)
[5] 張小斌. 計算機網(wǎng)絡(luò)安全工具[M]. 北京: 清華大學(xué)出版社 2002.3
[6] 吳金龍. 網(wǎng)絡(luò)安全[M]. 北京: 高等教育出版社 2004.
[7] 唐正軍. 黑客入侵防護(hù)系統(tǒng)代碼分析[M]. 北京: 機械工業(yè)出版社
[8] A. Tanenbaum. Computer Network 3 [M]. Pretice Hall, inc.
[9] 揚守軍 黑客技術(shù)與網(wǎng)絡(luò)安全[M]. 北京: 中國對外出版社 2000.
全文17頁 約15000字 論述翔實
[摘要]網(wǎng)絡(luò)安全性是一個涉及面很廣泛的問題, 本文從網(wǎng)絡(luò)安全基礎(chǔ)概念入手,對當(dāng)前計算機網(wǎng)絡(luò)中存在的各種安全隱患進(jìn)行了分析,并對由此所帶來的各種黑客攻擊手段著重分析,嚴(yán)峻的安全問題必然帶來與之對應(yīng)的安全防范技術(shù)如:訪問控制,入侵檢測,加密技術(shù),防火墻等...而防火墻技術(shù)是本文要主要論述的內(nèi)容.
大多數(shù)安全性問題的出現(xiàn)都是由于有惡意的人試圖獲得某種好處或損害某些人而故意引起的??梢钥闯霰WC網(wǎng)絡(luò)安全不僅僅是使它沒有編程錯誤。它包括要防范那些人為惡意破壞.網(wǎng)絡(luò)安全性可以被粗略地分為4個相互交織的部分:保密、鑒別、反拒認(rèn)以及完整性控制。保密是保護(hù)信息不被未授權(quán)者訪問,這是人們提到的網(wǎng)絡(luò)安全性時最常想到的內(nèi)容。鑒別主要指在揭示敏感信息或進(jìn)行事務(wù)處理之前先確認(rèn)對方的身份。反拒認(rèn)主要與簽名有關(guān)。保密和完整性通過使用注冊過的郵件和文件鎖來實現(xiàn)。
[關(guān)鍵詞] 計算機網(wǎng)絡(luò),網(wǎng)絡(luò)安全,系統(tǒng)漏洞
[Abstract] Security is a broad topic and covers a multitude of sins. I study Network Security from some basic concepts in this paper, for there are lots of potential security problems in computer network and all kinds of invading problems made by hackers, I put weight on these problems. Serious security problems will bring out some security precaution technology, such as visiting control, invading detection, firewall, and firewall technology and IDS is the key of this paper.
Most security problems are intentionally caused by malicious people trying to gain some benefit or harm someone. It should be clear that making a network secure involves some damages made hackers deliberately.
Network security problems can be divided roughly into four intertwined areas: secrecy, authentication, no repudiation, and integrity control. Secrecy has to do with keeping information out of the hands of unauthorized users. This is what usually comes to mind when people think about network security. Authentication deals with determining whom you are talking to before revealing sensitive information or entering into a business deal. No repudiation deals with signatures. Secrecy and integrity are achieved by using registered mail and locking documents up.
[Keywords] Network security Hole of system
目 錄
第一節(jié) 計算機系統(tǒng)安全中的網(wǎng)絡(luò)安全...........................................................................3
1.1.引言...........................................................................................................................3
1.2.計算機系統(tǒng)的安全隱患...........................................................................................3
1.3.網(wǎng)絡(luò)安全的定義與目標(biāo)...........................................................................................4
1.4.計算機網(wǎng)絡(luò)所面臨的威脅.......................................................................................4
第二節(jié) 網(wǎng)絡(luò)安全基礎(chǔ)理論和相關(guān)分析...........................................................................4
2.1.機密性與完整性需求...............................................................................................4
2.2.信任機制和公鑰基礎(chǔ)...............................................................................................5
2.3.鑒別與授權(quán)...............................................................................................................5
第三節(jié) 威脅網(wǎng)絡(luò)安全的攻擊技術(shù)原理...........................................................................6
3.1.黑客技術(shù)概述...........................................................................................................6
3.2.拒絕服務(wù)攻擊 (Denial of Service) .........................................................................6
3.3.緩沖區(qū)溢出攻擊.......................................................................................................7
3.4.網(wǎng)絡(luò)監(jiān)聽攻擊技術(shù)...................................................................................................9
3.5. IP欺騙攻擊..............................................................................................................9
3.6.計算機病毒.............................................................................................................10
3.7. Trojan Horse...........................................................................................................11
第四節(jié) 現(xiàn)有主要安全技術(shù).............................................................................................11
4.1.物理安全措施.........................................................................................................12
4.2.訪問控.....................................................................................................................12
4.3.防火墻技術(shù).............................................................................................................12
4.4.加密技術(shù).................................................................................................................13
4.5 現(xiàn)有安全技術(shù)的不足............................................................................................14
4.6網(wǎng)絡(luò)安全技術(shù)發(fā)展趨勢..........................................................................................14
結(jié)束語...............................................................................................................................16
致謝...................................................................................................................................16
參考文獻(xiàn)...........................................................................................................................17
部分參考文獻(xiàn)
[5] 張小斌. 計算機網(wǎng)絡(luò)安全工具[M]. 北京: 清華大學(xué)出版社 2002.3
[6] 吳金龍. 網(wǎng)絡(luò)安全[M]. 北京: 高等教育出版社 2004.
[7] 唐正軍. 黑客入侵防護(hù)系統(tǒng)代碼分析[M]. 北京: 機械工業(yè)出版社
[8] A. Tanenbaum. Computer Network 3 [M]. Pretice Hall, inc.
[9] 揚守軍 黑客技術(shù)與網(wǎng)絡(luò)安全[M]. 北京: 中國對外出版社 2000.
TA們正在看...
- 塑膠模具畢業(yè)設(shè)計論文塑件的成形工藝性分析.doc
- 塑料模具畢業(yè),課程設(shè)計說明任務(wù)書,圓蓋注塑模設(shè)...doc
- 塑料模具畢業(yè),課程設(shè)計說明任務(wù)書,圓蓋注塑模設(shè)...doc
- 塑料注射模具設(shè)計與制造實例.doc
- 注塑模具畢業(yè)論文.doc
- 注塑模具畢業(yè)設(shè)計論文(鬧鐘后蓋實例)附圖紙.doc
- 注塑模具典型結(jié)構(gòu).ppt
- 畢業(yè)設(shè)計我國蔬菜硝酸鹽污染現(xiàn)狀及防治研究.doc
- 畢業(yè)設(shè)計正反循環(huán)鉆機設(shè)計.doc
- 高速鐵路論文淺談我國高鐵發(fā)展的現(xiàn)狀及展望.doc