特级做A爰片毛片免费69,永久免费AV无码不卡在线观看,国产精品无码av地址一,久久无码色综合中文字幕

windows 系統(tǒng)攻擊技術(shù)研究.doc

    
約42頁DOC格式手機打開展開

windows 系統(tǒng)攻擊技術(shù)研究,windows 系統(tǒng)攻擊技術(shù)研究 1.67萬字我自己的畢業(yè)論文,原創(chuàng)的,已經(jīng)通過校內(nèi)系統(tǒng)檢測,僅在本站獨家出售,重復率低,大家放心下載使用目錄第一章 緒論11.1引 言11.2研究內(nèi)容和組織結(jié)構(gòu)1第二章 windows操作系統(tǒng)概述32.1 windows操作系統(tǒng)簡述32.2 windows操作系統(tǒng)使用現(xiàn)狀32.3 wi...
編號:150-423047大小:2.39M
分類: 論文>通信/電子論文

內(nèi)容介紹

此文檔由會員 淘寶大夢 發(fā)布

Windows 系統(tǒng)攻擊技術(shù)研究

1.67萬字
我自己的畢業(yè)論文,原創(chuàng)的,已經(jīng)通過校內(nèi)系統(tǒng)檢測,僅在本站獨家出售,重復率低,大家放心下載使用

目 錄
第一章 緒論 1
1.1引 言 1
1.2研究內(nèi)容和組織結(jié)構(gòu) 1
第二章 Windows操作系統(tǒng)概述 3
2.1 Windows操作系統(tǒng)簡述 3
2.2 Windows操作系統(tǒng)使用現(xiàn)狀 3
2.3 Windows操作系統(tǒng)未來及影響 4
第三章 Windows操作系統(tǒng)攻擊技術(shù)簡介 5
3.1 Windows系統(tǒng)攻擊者的攻擊流程 5
3.2 Windows系統(tǒng)攻擊者典型攻擊技術(shù) 7
3.2.1拒絕服務攻擊(Do’s) 7
3.2.2 黑客入侵 8
第四章Windows操作系統(tǒng)攻擊技術(shù)的相關(guān)實驗 11
4.1 Windows 系統(tǒng)LC5口令破解實驗 11
4.1.1 實驗目的 11
4.1.2 實驗原理 11
4.1.3 實驗內(nèi)容 12
4.2 ARP攻擊 22
4.2.1 實驗目的 22
4.2.2 實驗原理 22
4.2.3 實驗分析 22
4.2.4 IP地址沖突 25
4.3 Windows系統(tǒng)XSS攻擊 28
4.3.1 實驗目的 28
4.3.2 實驗原理 28
4.3.3 實驗內(nèi)容 29
第五章 基于Windows操作系統(tǒng)攻擊的防范 30
5.1 Windows操作系統(tǒng)端口掃描 30
5.2 個人計算機維護工具 33
5.3 培養(yǎng)良好的個人計算機使用習慣 34
結(jié) 論 36
致 謝 37
參考文獻 38

摘要 Windows操作系統(tǒng)擁有全球最多的用戶,它已成為目前市面上的主流操作系統(tǒng),為我們的生活和工作提供了很大的便利。但是如今計算機攻擊入侵犯罪活動越來越猖獗,Windows操作系統(tǒng)已成為眾多攻擊者所覬覦的攻擊目標,面臨的威脅包括木馬攻擊、病毒攻擊以及各種惡意攻擊。這些攻擊的危害不言而知,它們會泄露用戶的秘密信息,攻擊者通過販賣企業(yè)信息、惡意破壞等等手段為用戶帶來無限的利益損害,甚至是損害國家,地區(qū)等政治和經(jīng)濟利益。所以Windows系統(tǒng)的安全問題日益得到重視。
本論文介紹了信息安全的概念,Windows操作系統(tǒng)的安全現(xiàn)狀及其發(fā)展趨勢,強調(diào)了其安全的重要性。同時本文將簡單系統(tǒng)地講解Windows操作系統(tǒng)攻擊技術(shù),以攻擊者角度,介紹如何進行Windows操作系統(tǒng)的攻擊。本設計選擇通過研究Windows系統(tǒng)的攻擊技術(shù)的一些攻擊技巧和原理,如LC5口令攻擊,ARP協(xié)議攻擊,xxs緩沖區(qū)溢出攻擊等研究,由淺入深的了解Windows操作系統(tǒng)的缺陷和潛在威脅。針對技巧、思路和攻擊方法設計相應的實驗,進而對一些典型的攻擊提出了相應的解決方法,并采取更能強有力的掌握防范措施。通過這幾個實驗提高自己對Windows系統(tǒng)原理的認識,了解這些技術(shù)細節(jié)的基礎上進行相應的防范措施以保護計算機用戶的信息安全,為使用Windows操作系統(tǒng)的用戶提供一個安全的保障。

關(guān)鍵詞: Windows系統(tǒng) 安全 攻擊技術(shù) 防范


Research on the Attack Techniques of Windows System
Abstract With the development of Internet and information technology, the great growth has appeared out in information security. This trend lead to more venture, network security issue has become the cardinal task that various kinds of online activity need to consider. At present, one of the biggest problems on network is the attack techniques of windows system. Windows operating system has the most users around the world. Obviously, it has become the mainstream operating system in the market that provides a great convenience for our life and work. But it have been targeted by a lot of attackers is a seriously problem in network security. Including Trojan attacks, virus attacks and malicious attacks. These attacks will reveal the user's secret information, and the attacker damage to the political, corporate information and economic interests of the state, region and so on. So Windows system security issues increasing attention .This paper introduced the concept of information security, security situation and developing trend of Windows operating systems. It stressed the importance of security. This article will simply learn the attack techniques systematically and explain the Windows operating system. Getting the tips, ideas and methods of attack to design appropriate experiments from the attacker perspective. Taking some attack techniques of the Windows operating system, such as LC5 password attack, Windows operating system loophole attack ,and other research, To understand of the complexity of the Windows operating system and to acquire the principles of Windows system Which is designed several technologies related to Windows system attacks experiment. In order to protect the computer user's information security with a secure protection, through the appropriate preventive measures on the basis of these technical details .By understanding the motives of attackers and attack process and reducing the system vulnerability attacks. In the end to make the corresponding preventive measures to protect the information security of computer user. To use the Windows operating system provides users with a security guarantee. I put forward my own opinion of precautionary measures on windows operating system attacking and protecting.
Key words Windows System Security Attack Techniques Prevention