計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù).doc
約17頁DOC格式手機(jī)打開展開
計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù),全文17頁約15000字論述翔實(shí)[摘要]網(wǎng)絡(luò)安全性是一個(gè)涉及面很廣泛的問題, 本文從網(wǎng)絡(luò)安全基礎(chǔ)概念入手,對(duì)當(dāng)前計(jì)算機(jī)網(wǎng)絡(luò)中存在的各種安全隱患進(jìn)行了分析,并對(duì)由此所帶來的各種黑客攻擊手段著重分析,嚴(yán)峻的安全問題必然帶來與之對(duì)應(yīng)的安全防范技術(shù)如:訪問控制,入侵檢測(cè),加密技術(shù),防火墻等...而防火墻技術(shù)是...
內(nèi)容介紹
此文檔由會(huì)員 棉花糖糖 發(fā)布
計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)
全文17頁 約15000字 論述翔實(shí)
[摘要]網(wǎng)絡(luò)安全性是一個(gè)涉及面很廣泛的問題, 本文從網(wǎng)絡(luò)安全基礎(chǔ)概念入手,對(duì)當(dāng)前計(jì)算機(jī)網(wǎng)絡(luò)中存在的各種安全隱患進(jìn)行了分析,并對(duì)由此所帶來的各種黑客攻擊手段著重分析,嚴(yán)峻的安全問題必然帶來與之對(duì)應(yīng)的安全防范技術(shù)如:訪問控制,入侵檢測(cè),加密技術(shù),防火墻等...而防火墻技術(shù)是本文要主要論述的內(nèi)容.
大多數(shù)安全性問題的出現(xiàn)都是由于有惡意的人試圖獲得某種好處或損害某些人而故意引起的。可以看出保證網(wǎng)絡(luò)安全不僅僅是使它沒有編程錯(cuò)誤。它包括要防范那些人為惡意破壞.網(wǎng)絡(luò)安全性可以被粗略地分為4個(gè)相互交織的部分:保密、鑒別、反拒認(rèn)以及完整性控制。保密是保護(hù)信息不被未授權(quán)者訪問,這是人們提到的網(wǎng)絡(luò)安全性時(shí)最常想到的內(nèi)容。鑒別主要指在揭示敏感信息或進(jìn)行事務(wù)處理之前先確認(rèn)對(duì)方的身份。反拒認(rèn)主要與簽名有關(guān)。保密和完整性通過使用注冊(cè)過的郵件和文件鎖來實(shí)現(xiàn)。
[關(guān)鍵詞] 計(jì)算機(jī)網(wǎng)絡(luò),網(wǎng)絡(luò)安全,系統(tǒng)漏洞
[Abstract] Security is a broad topic and covers a multitude of sins. I study Network Security from some basic concepts in this paper, for there are lots of potential security problems in computer network and all kinds of invading problems made by hackers, I put weight on these problems. Serious security problems will bring out some security precaution technology, such as visiting control, invading detection, firewall, and firewall technology and IDS is the key of this paper.
Most security problems are intentionally caused by malicious people trying to gain some benefit or harm someone. It should be clear that making a network secure involves some damages made hackers deliberately.
Network security problems can be divided roughly into four intertwined areas: secrecy, authentication, no repudiation, and integrity control. Secrecy has to do with keeping information out of the hands of unauthorized users. This is what usually comes to mind when people think about network security. Authentication deals with determining whom you are talking to before revealing sensitive information or entering into a business deal. No repudiation deals with signatures. Secrecy and integrity are achieved by using registered mail and locking documents up.
[Keywords] Network security Hole of system
目 錄
第一節(jié) 計(jì)算機(jī)系統(tǒng)安全中的網(wǎng)絡(luò)安全...........................................................................3
1.1.引言...........................................................................................................................3
1.2.計(jì)算機(jī)系統(tǒng)的安全隱患...........................................................................................3
1.3.網(wǎng)絡(luò)安全的定義與目標(biāo)...........................................................................................4
1.4.計(jì)算機(jī)網(wǎng)絡(luò)所面臨的威脅.......................................................................................4
第二節(jié) 網(wǎng)絡(luò)安全基礎(chǔ)理論和相關(guān)分析...........................................................................4
2.1.機(jī)密性與完整性需求...............................................................................................4
2.2.信任機(jī)制和公鑰基礎(chǔ)...............................................................................................5
2.3.鑒別與授權(quán)...............................................................................................................5
第三節(jié) 威脅網(wǎng)絡(luò)安全的攻擊技術(shù)原理...........................................................................6
3.1.黑客技術(shù)概述...........................................................................................................6
3.2.拒絕服務(wù)攻擊 (Denial of Service) .........................................................................6
3.3.緩沖區(qū)溢出攻擊.......................................................................................................7
3.4.網(wǎng)絡(luò)監(jiān)聽攻擊技術(shù)...................................................................................................9
3.5. IP欺騙攻擊..............................................................................................................9
3.6.計(jì)算機(jī)病毒.............................................................................................................10
3.7. Trojan Horse...........................................................................................................11
第四節(jié) 現(xiàn)有主要安全技術(shù).............................................................................................11
4.1.物理安全措施.........................................................................................................12
4.2.訪問控.....................................................................................................................12
4.3.防火墻技術(shù).............................................................................................................12
4.4.加密技術(shù).................................................................................................................13
4.5 現(xiàn)有安全技術(shù)的不足............................................................................................14
4.6網(wǎng)絡(luò)安全技術(shù)發(fā)展趨勢(shì)..........................................................................................14
結(jié)束語...............................................................................................................................16
致謝...................................................................................................................................16
參考文獻(xiàn)...........................................................................................................................17
部分參考文獻(xiàn)
[5] 張小斌. 計(jì)算機(jī)網(wǎng)絡(luò)安全工具[M]. 北京: 清華大學(xué)出版社 2002.3
[6] 吳金龍. 網(wǎng)絡(luò)安全[M]. 北京: 高等教育出版社 2004.
[7] 唐正軍. 黑客入侵防護(hù)系統(tǒng)代碼分析[M]. 北京: 機(jī)械工業(yè)出版社
[8] A. Tanenbaum. Computer Network 3 [M]. Pretice Hall, inc.
[9] 揚(yáng)守軍 黑客技術(shù)與網(wǎng)絡(luò)安全[M]. 北京: 中國對(duì)外出版社 2000.
全文17頁 約15000字 論述翔實(shí)
[摘要]網(wǎng)絡(luò)安全性是一個(gè)涉及面很廣泛的問題, 本文從網(wǎng)絡(luò)安全基礎(chǔ)概念入手,對(duì)當(dāng)前計(jì)算機(jī)網(wǎng)絡(luò)中存在的各種安全隱患進(jìn)行了分析,并對(duì)由此所帶來的各種黑客攻擊手段著重分析,嚴(yán)峻的安全問題必然帶來與之對(duì)應(yīng)的安全防范技術(shù)如:訪問控制,入侵檢測(cè),加密技術(shù),防火墻等...而防火墻技術(shù)是本文要主要論述的內(nèi)容.
大多數(shù)安全性問題的出現(xiàn)都是由于有惡意的人試圖獲得某種好處或損害某些人而故意引起的。可以看出保證網(wǎng)絡(luò)安全不僅僅是使它沒有編程錯(cuò)誤。它包括要防范那些人為惡意破壞.網(wǎng)絡(luò)安全性可以被粗略地分為4個(gè)相互交織的部分:保密、鑒別、反拒認(rèn)以及完整性控制。保密是保護(hù)信息不被未授權(quán)者訪問,這是人們提到的網(wǎng)絡(luò)安全性時(shí)最常想到的內(nèi)容。鑒別主要指在揭示敏感信息或進(jìn)行事務(wù)處理之前先確認(rèn)對(duì)方的身份。反拒認(rèn)主要與簽名有關(guān)。保密和完整性通過使用注冊(cè)過的郵件和文件鎖來實(shí)現(xiàn)。
[關(guān)鍵詞] 計(jì)算機(jī)網(wǎng)絡(luò),網(wǎng)絡(luò)安全,系統(tǒng)漏洞
[Abstract] Security is a broad topic and covers a multitude of sins. I study Network Security from some basic concepts in this paper, for there are lots of potential security problems in computer network and all kinds of invading problems made by hackers, I put weight on these problems. Serious security problems will bring out some security precaution technology, such as visiting control, invading detection, firewall, and firewall technology and IDS is the key of this paper.
Most security problems are intentionally caused by malicious people trying to gain some benefit or harm someone. It should be clear that making a network secure involves some damages made hackers deliberately.
Network security problems can be divided roughly into four intertwined areas: secrecy, authentication, no repudiation, and integrity control. Secrecy has to do with keeping information out of the hands of unauthorized users. This is what usually comes to mind when people think about network security. Authentication deals with determining whom you are talking to before revealing sensitive information or entering into a business deal. No repudiation deals with signatures. Secrecy and integrity are achieved by using registered mail and locking documents up.
[Keywords] Network security Hole of system
目 錄
第一節(jié) 計(jì)算機(jī)系統(tǒng)安全中的網(wǎng)絡(luò)安全...........................................................................3
1.1.引言...........................................................................................................................3
1.2.計(jì)算機(jī)系統(tǒng)的安全隱患...........................................................................................3
1.3.網(wǎng)絡(luò)安全的定義與目標(biāo)...........................................................................................4
1.4.計(jì)算機(jī)網(wǎng)絡(luò)所面臨的威脅.......................................................................................4
第二節(jié) 網(wǎng)絡(luò)安全基礎(chǔ)理論和相關(guān)分析...........................................................................4
2.1.機(jī)密性與完整性需求...............................................................................................4
2.2.信任機(jī)制和公鑰基礎(chǔ)...............................................................................................5
2.3.鑒別與授權(quán)...............................................................................................................5
第三節(jié) 威脅網(wǎng)絡(luò)安全的攻擊技術(shù)原理...........................................................................6
3.1.黑客技術(shù)概述...........................................................................................................6
3.2.拒絕服務(wù)攻擊 (Denial of Service) .........................................................................6
3.3.緩沖區(qū)溢出攻擊.......................................................................................................7
3.4.網(wǎng)絡(luò)監(jiān)聽攻擊技術(shù)...................................................................................................9
3.5. IP欺騙攻擊..............................................................................................................9
3.6.計(jì)算機(jī)病毒.............................................................................................................10
3.7. Trojan Horse...........................................................................................................11
第四節(jié) 現(xiàn)有主要安全技術(shù).............................................................................................11
4.1.物理安全措施.........................................................................................................12
4.2.訪問控.....................................................................................................................12
4.3.防火墻技術(shù).............................................................................................................12
4.4.加密技術(shù).................................................................................................................13
4.5 現(xiàn)有安全技術(shù)的不足............................................................................................14
4.6網(wǎng)絡(luò)安全技術(shù)發(fā)展趨勢(shì)..........................................................................................14
結(jié)束語...............................................................................................................................16
致謝...................................................................................................................................16
參考文獻(xiàn)...........................................................................................................................17
部分參考文獻(xiàn)
[5] 張小斌. 計(jì)算機(jī)網(wǎng)絡(luò)安全工具[M]. 北京: 清華大學(xué)出版社 2002.3
[6] 吳金龍. 網(wǎng)絡(luò)安全[M]. 北京: 高等教育出版社 2004.
[7] 唐正軍. 黑客入侵防護(hù)系統(tǒng)代碼分析[M]. 北京: 機(jī)械工業(yè)出版社
[8] A. Tanenbaum. Computer Network 3 [M]. Pretice Hall, inc.
[9] 揚(yáng)守軍 黑客技術(shù)與網(wǎng)絡(luò)安全[M]. 北京: 中國對(duì)外出版社 2000.
TA們正在看...
- 01.1四時(shí)田園雜興課堂教學(xué)教案教學(xué)設(shè)計(jì)(部編版).doc
- 01.2稚子弄冰課堂教學(xué)教案教學(xué)設(shè)計(jì)(部編版).doc
- 01.3村晚課堂教學(xué)教案教學(xué)設(shè)計(jì)(部編版).doc
- 02冬陽·童年·駱駝隊(duì)公開課優(yōu)秀教案教學(xué)設(shè)計(jì)(五年...doc
- 02冬陽·童年·駱駝隊(duì)最新教研教案教學(xué)設(shè)計(jì)(部編版...doc
- 02冬陽·童年·駱駝隊(duì)課堂教學(xué)教案教學(xué)設(shè)計(jì)(部編版).doc
- 03祖父的園子公開課優(yōu)秀教案教學(xué)設(shè)計(jì)(五年級(jí)下冊(cè)).doc
- 03祖父的園子最新教研教案教學(xué)設(shè)計(jì)(部編版五年級(jí)下...doc
- 03祖父的園子課堂教學(xué)教案教學(xué)設(shè)計(jì)(部編版).doc
- 04草船借箭公開課優(yōu)秀教案教學(xué)設(shè)計(jì)(五年級(jí)下冊(cè)).doc