特级做A爰片毛片免费69,永久免费AV无码不卡在线观看,国产精品无码av地址一,久久无码色综合中文字幕

計算機網(wǎng)絡(luò)安全技術(shù).doc

約17頁DOC格式手機打開展開

計算機網(wǎng)絡(luò)安全技術(shù),全文17頁約15000字論述翔實[摘要]網(wǎng)絡(luò)安全性是一個涉及面很廣泛的問題, 本文從網(wǎng)絡(luò)安全基礎(chǔ)概念入手,對當(dāng)前計算機網(wǎng)絡(luò)中存在的各種安全隱患進(jìn)行了分析,并對由此所帶來的各種黑客攻擊手段著重分析,嚴(yán)峻的安全問題必然帶來與之對應(yīng)的安全防范技術(shù)如:訪問控制,入侵檢測,加密技術(shù),防火墻等...而防火墻技術(shù)是...
編號:10-28322大小:85.00K
分類: 論文>計算機論文

內(nèi)容介紹

此文檔由會員 棉花糖糖 發(fā)布

計算機網(wǎng)絡(luò)安全技術(shù)

全文17頁 約15000字 論述翔實

[摘要]網(wǎng)絡(luò)安全性是一個涉及面很廣泛的問題, 本文從網(wǎng)絡(luò)安全基礎(chǔ)概念入手,對當(dāng)前計算機網(wǎng)絡(luò)中存在的各種安全隱患進(jìn)行了分析,并對由此所帶來的各種黑客攻擊手段著重分析,嚴(yán)峻的安全問題必然帶來與之對應(yīng)的安全防范技術(shù)如:訪問控制,入侵檢測,加密技術(shù),防火墻等...而防火墻技術(shù)是本文要主要論述的內(nèi)容.
大多數(shù)安全性問題的出現(xiàn)都是由于有惡意的人試圖獲得某種好處或損害某些人而故意引起的??梢钥闯霰WC網(wǎng)絡(luò)安全不僅僅是使它沒有編程錯誤。它包括要防范那些人為惡意破壞.網(wǎng)絡(luò)安全性可以被粗略地分為4個相互交織的部分:保密、鑒別、反拒認(rèn)以及完整性控制。保密是保護(hù)信息不被未授權(quán)者訪問,這是人們提到的網(wǎng)絡(luò)安全性時最常想到的內(nèi)容。鑒別主要指在揭示敏感信息或進(jìn)行事務(wù)處理之前先確認(rèn)對方的身份。反拒認(rèn)主要與簽名有關(guān)。保密和完整性通過使用注冊過的郵件和文件鎖來實現(xiàn)。

[關(guān)鍵詞] 計算機網(wǎng)絡(luò),網(wǎng)絡(luò)安全,系統(tǒng)漏洞

[Abstract] Security is a broad topic and covers a multitude of sins. I study Network Security from some basic concepts in this paper, for there are lots of potential security problems in computer network and all kinds of invading problems made by hackers, I put weight on these problems. Serious security problems will bring out some security precaution technology, such as visiting control, invading detection, firewall, and firewall technology and IDS is the key of this paper.
Most security problems are intentionally caused by malicious people trying to gain some benefit or harm someone. It should be clear that making a network secure involves some damages made hackers deliberately.
Network security problems can be divided roughly into four intertwined areas: secrecy, authentication, no repudiation, and integrity control. Secrecy has to do with keeping information out of the hands of unauthorized users. This is what usually comes to mind when people think about network security. Authentication deals with determining whom you are talking to before revealing sensitive information or entering into a business deal. No repudiation deals with signatures. Secrecy and integrity are achieved by using registered mail and locking documents up.
[Keywords] Network security Hole of system

目 錄

第一節(jié) 計算機系統(tǒng)安全中的網(wǎng)絡(luò)安全...........................................................................3
1.1.引言...........................................................................................................................3
1.2.計算機系統(tǒng)的安全隱患...........................................................................................3
1.3.網(wǎng)絡(luò)安全的定義與目標(biāo)...........................................................................................4
1.4.計算機網(wǎng)絡(luò)所面臨的威脅.......................................................................................4
第二節(jié) 網(wǎng)絡(luò)安全基礎(chǔ)理論和相關(guān)分析...........................................................................4
2.1.機密性與完整性需求...............................................................................................4
2.2.信任機制和公鑰基礎(chǔ)...............................................................................................5
2.3.鑒別與授權(quán)...............................................................................................................5
第三節(jié) 威脅網(wǎng)絡(luò)安全的攻擊技術(shù)原理...........................................................................6
3.1.黑客技術(shù)概述...........................................................................................................6
3.2.拒絕服務(wù)攻擊 (Denial of Service) .........................................................................6
3.3.緩沖區(qū)溢出攻擊.......................................................................................................7
3.4.網(wǎng)絡(luò)監(jiān)聽攻擊技術(shù)...................................................................................................9
3.5. IP欺騙攻擊..............................................................................................................9
3.6.計算機病毒.............................................................................................................10
3.7. Trojan Horse...........................................................................................................11
第四節(jié) 現(xiàn)有主要安全技術(shù).............................................................................................11
4.1.物理安全措施.........................................................................................................12
4.2.訪問控.....................................................................................................................12
4.3.防火墻技術(shù).............................................................................................................12
4.4.加密技術(shù).................................................................................................................13
4.5 現(xiàn)有安全技術(shù)的不足............................................................................................14
4.6網(wǎng)絡(luò)安全技術(shù)發(fā)展趨勢..........................................................................................14
結(jié)束語...............................................................................................................................16
致謝...................................................................................................................................16
參考文獻(xiàn)...........................................................................................................................17

部分參考文獻(xiàn)

[5] 張小斌. 計算機網(wǎng)絡(luò)安全工具[M]. 北京: 清華大學(xué)出版社 2002.3
[6] 吳金龍. 網(wǎng)絡(luò)安全[M]. 北京: 高等教育出版社 2004.
[7] 唐正軍. 黑客入侵防護(hù)系統(tǒng)代碼分析[M]. 北京: 機械工業(yè)出版社
[8] A. Tanenbaum. Computer Network 3 [M]. Pretice Hall, inc.
[9] 揚守軍 黑客技術(shù)與網(wǎng)絡(luò)安全[M]. 北京: 中國對外出版社 2000.