特级做A爰片毛片免费69,永久免费AV无码不卡在线观看,国产精品无码av地址一,久久无码色综合中文字幕

網(wǎng)絡(luò)信息安全畢業(yè)論文.rar

RAR格式版權(quán)申訴手機(jī)打開展開

網(wǎng)絡(luò)信息安全畢業(yè)論文,8700字 10頁摘要:當(dāng)我們評判一個系統(tǒng)是否安全時,不應(yīng)該只看它應(yīng)用了多么先進(jìn)的設(shè)施,更應(yīng)該了解它最大的弱點(diǎn)是什么,因?yàn)榫W(wǎng)絡(luò)的安全性取決于它最薄弱環(huán)節(jié)的安全性。 通過考察近幾年在 internet 上發(fā)生的黑客攻擊事件,我們不難看出威脅網(wǎng)絡(luò)安全的基本模式是一樣的。特別在大量自動軟件工具出現(xiàn)以后,加...
編號:30-77367大小:30.60K
分類: 論文>計算機(jī)論文

該文檔為壓縮文件,包含的文件列表如下:

內(nèi)容介紹

原文檔由會員 xiaowei 發(fā)布

網(wǎng)絡(luò)信息安全畢業(yè)論文
8700字 10頁



摘要:當(dāng)我們評判一個系統(tǒng)是否安全時,不應(yīng)該只看它應(yīng)用了多么先進(jìn)的設(shè)施,更應(yīng)該了解它最大的弱點(diǎn)是什么,因?yàn)榫W(wǎng)絡(luò)的安全性取決于它最薄弱環(huán)節(jié)的安全性。
通過考察近幾年在 Internet 上發(fā)生的黑客攻擊事件,我們不難看出威脅網(wǎng)絡(luò)安全的基本模式是一樣的。特別在大量自動軟件工具出現(xiàn)以后,加之 Internet 提供的便利,攻擊者可以很方便地組成團(tuán)體,使得網(wǎng)絡(luò)安全受到的威脅更加嚴(yán)重。
隱藏在世界各地的攻擊者通常可以越過算法本身,不需要去試每一個可能的密鑰,甚至不需要去尋找算法本身的漏洞,他們能夠利用所有可能就范的錯誤,包括設(shè)計錯誤、安裝配置錯誤及教育培訓(xùn)失誤等,向網(wǎng)絡(luò)發(fā)起攻擊。但在大多數(shù)情況下,他們是利用設(shè)計者們犯的一次次重復(fù)發(fā)生的錯誤輕松得逞的。
我們可以粗略地將對系統(tǒng)安全造成的威脅歸結(jié)為 6 大類 : 教育培訓(xùn)問題、變節(jié)的員工、系統(tǒng)軟件的缺陷、對硬件的攻擊、錯誤的信任模型和拒絕服務(wù)。需要指出的是,這幾類威脅之間可能會有交叉與重疊之處。另外,一些文獻(xiàn)對系統(tǒng)安全的威脅分類方法可能同這里給出的不同,但大多沒有本質(zhì)的區(qū)別。
[關(guān)鍵字] : 網(wǎng)絡(luò) 系統(tǒng)軟件 特洛伊木馬

Network information security

Abstract:When we adjudicate a system whether safety, shouldn't should see only it applied the how advanced facilities, should also understand it biggest weakness is safety that safety that what, because the network is decided by it the most weak link.
Pass to investigate in the last few years black an attack affairs taken place on the Internet, we are not difficult to see a basic mode for threatenning the network is safe is similar.It is special to appear hereafter in the automatic software in large quantity tool, convenience that add that Internet provide, the aggressor can constitute the group very expediently, making the threat that network safety suffer been serious more.
Concealing the aggressor in world-wide locations can usually cross the calculate way oneself, doing not need to try each a mistake for possible Key of encrypting , even doing not need to looking for loophole of oneself calculate way, they can making use of mistakes , including to design the mistake and install to install the mistake and educate training error etc., starting to network the attack.But under the majority the circumstance, they are to make use of the design make a to repeat what the mistake of the occurrence is not relaxed to succeed.
We can return knot as the 6 major type to the system safety the threat that result in roughly then: Education training problem, the employee, system who change of loyalty the blemish of the software, to the attack, false and trustful of model of the hardware with brush-off serve.What demand point out is, this of several threat may have place that cross with the overlap.Moreover, the some cultural heritage divides into section to the safe threat in system the method may give here together out of different, but have no the hypostatic differentiation mostly.
[Key words]: Network ,System software , Trojam horse



參考文件:
[1]《網(wǎng)絡(luò)攻擊原理與技術(shù) 》 作者: 連一峰 出版社: 科學(xué)出版社
[2]《黑客帝國—Internet 安全防范實(shí)例》作者: 馮曉聰 王騰宇 梅珊 出版社: 中國電力出版社
[3]《網(wǎng)絡(luò)安全技術(shù)教程--攻擊與防范》 作者: 黃鑫 沈傳寧 吳魯加 編 出版社: 中國電力出版社