計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù).doc
約17頁(yè)DOC格式手機(jī)打開展開
計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù),目錄第一節(jié) 計(jì)算機(jī)系統(tǒng)安全中的網(wǎng)絡(luò)安全...........................................................................31.1.引言..............................................................
![](http://img.queshao.com/images/pcgzh.gif)
![](http://preview.queshao.com/tobuy/2006.gif)
內(nèi)容介紹
此文檔由會(huì)員 superjunior 發(fā)布
目 錄
第一節(jié) 計(jì)算機(jī)系統(tǒng)安全中的網(wǎng)絡(luò)安全...........................................................................3
1.1.引言...........................................................................................................................3
1.2.計(jì)算機(jī)系統(tǒng)的安全隱患...........................................................................................3
1.3.網(wǎng)絡(luò)安全的定義與目標(biāo)...........................................................................................4
1.4.計(jì)算機(jī)網(wǎng)絡(luò)所面臨的威脅.......................................................................................4
第二節(jié) 網(wǎng)絡(luò)安全基礎(chǔ)理論和相關(guān)分析...........................................................................4
2.1.機(jī)密性與完整性需求...............................................................................................4
2.2.信任機(jī)制和公鑰基礎(chǔ)...............................................................................................5
2.3.鑒別與授權(quán)...............................................................................................................5
第三節(jié) 威脅網(wǎng)絡(luò)安全的攻擊技術(shù)原理...........................................................................6
3.1.黑客技術(shù)概述...........................................................................................................6
3.2.拒絕服務(wù)攻擊 (Denial of Service) .........................................................................6
3.3.緩沖區(qū)溢出攻擊.......................................................................................................7
3.4.網(wǎng)絡(luò)監(jiān)聽攻擊技術(shù)...................................................................................................9
3.5. IP欺騙攻擊..............................................................................................................9
3.6.計(jì)算機(jī)病毒.............................................................................................................10
3.7. Trojan Horse...........................................................................................................11
第四節(jié) 現(xiàn)有主要安全技術(shù).............................................................................................11
4.1.物理安全措施.........................................................................................................12
4.2.訪問(wèn)控.....................................................................................................................12
4.3.防火墻技術(shù).............................................................................................................12
4.4.加密技術(shù).................................................................................................................13
4.5 現(xiàn)有安全技術(shù)的不足............................................................................................14
4.6網(wǎng)絡(luò)安全技術(shù)發(fā)展趨勢(shì)..........................................................................................14
結(jié)束語(yǔ)...............................................................................................................................16
致謝...................................................................................................................................16
參考文獻(xiàn)...........................................................................................................................17
第一節(jié) 計(jì)算機(jī)系統(tǒng)安全中的網(wǎng)絡(luò)安全...........................................................................3
1.1.引言...........................................................................................................................3
1.2.計(jì)算機(jī)系統(tǒng)的安全隱患...........................................................................................3
1.3.網(wǎng)絡(luò)安全的定義與目標(biāo)...........................................................................................4
1.4.計(jì)算機(jī)網(wǎng)絡(luò)所面臨的威脅.......................................................................................4
第二節(jié) 網(wǎng)絡(luò)安全基礎(chǔ)理論和相關(guān)分析...........................................................................4
2.1.機(jī)密性與完整性需求...............................................................................................4
2.2.信任機(jī)制和公鑰基礎(chǔ)...............................................................................................5
2.3.鑒別與授權(quán)...............................................................................................................5
第三節(jié) 威脅網(wǎng)絡(luò)安全的攻擊技術(shù)原理...........................................................................6
3.1.黑客技術(shù)概述...........................................................................................................6
3.2.拒絕服務(wù)攻擊 (Denial of Service) .........................................................................6
3.3.緩沖區(qū)溢出攻擊.......................................................................................................7
3.4.網(wǎng)絡(luò)監(jiān)聽攻擊技術(shù)...................................................................................................9
3.5. IP欺騙攻擊..............................................................................................................9
3.6.計(jì)算機(jī)病毒.............................................................................................................10
3.7. Trojan Horse...........................................................................................................11
第四節(jié) 現(xiàn)有主要安全技術(shù).............................................................................................11
4.1.物理安全措施.........................................................................................................12
4.2.訪問(wèn)控.....................................................................................................................12
4.3.防火墻技術(shù).............................................................................................................12
4.4.加密技術(shù).................................................................................................................13
4.5 現(xiàn)有安全技術(shù)的不足............................................................................................14
4.6網(wǎng)絡(luò)安全技術(shù)發(fā)展趨勢(shì)..........................................................................................14
結(jié)束語(yǔ)...............................................................................................................................16
致謝...................................................................................................................................16
參考文獻(xiàn)...........................................................................................................................17