计算机网络安全技术.doc
约17页DOC格式手机打开展开
计算机网络安全技术,全文17页约15000字论述翔实[摘要]网络安全性是一个涉及面很广泛的问题, 本文从网络安全基础概念入手,对当前计算机网络中存在的各种安全隐患进行了分析,并对由此所带来的各种黑客攻击手段着重分析,严峻的安全问题必然带来与之对应的安全防范技术如:访问控制,入侵检测,加密技术,防火墙等...而防火墙技术是...
内容介绍
此文档由会员 棉花糖糖 发布
计算机网络安全技术
全文17页 约15000字 论述翔实
[摘要]网络安全性是一个涉及面很广泛的问题, 本文从网络安全基础概念入手,对当前计算机网络中存在的各种安全隐患进行了分析,并对由此所带来的各种黑客攻击手段着重分析,严峻的安全问题必然带来与之对应的安全防范技术如:访问控制,入侵检测,加密技术,防火墙等...而防火墙技术是本文要主要论述的内容.
大多数安全性问题的出现都是由于有恶意的人试图获得某种好处或损害某些人而故意引起的。可以看出保证网络安全不仅仅是使它没有编程错误。它包括要防范那些人为恶意破坏.网络安全性可以被粗略地分为4个相互交织的部分:保密、鉴别、反拒认以及完整性控制。保密是保护信息不被未授权者访问,这是人们提到的网络安全性时最常想到的内容。鉴别主要指在揭示敏感信息或进行事务处理之前先确认对方的身份。反拒认主要与签名有关。保密和完整性通过使用注册过的邮件和文件锁来实现。
[关键词] 计算机网络,网络安全,系统漏洞
[Abstract] Security is a broad topic and covers a multitude of sins. I study Network Security from some basic concepts in this paper, for there are lots of potential security problems in computer network and all kinds of invading problems made by hackers, I put weight on these problems. Serious security problems will bring out some security precaution technology, such as visiting control, invading detection, firewall, and firewall technology and IDS is the key of this paper.
Most security problems are intentionally caused by malicious people trying to gain some benefit or harm someone. It should be clear that making a network secure involves some damages made hackers deliberately.
Network security problems can be divided roughly into four intertwined areas: secrecy, authentication, no repudiation, and integrity control. Secrecy has to do with keeping information out of the hands of unauthorized users. This is what usually comes to mind when people think about network security. Authentication deals with determining whom you are talking to before revealing sensitive information or entering into a business deal. No repudiation deals with signatures. Secrecy and integrity are achieved by using registered mail and locking documents up.
[Keywords] Network security Hole of system
目 录
第一节 计算机系统安全中的网络安全...........................................................................3
1.1.引言...........................................................................................................................3
1.2.计算机系统的安全隐患...........................................................................................3
1.3.网络安全的定义与目标...........................................................................................4
1.4.计算机网络所面临的威胁.......................................................................................4
第二节 网络安全基础理论和相关分析...........................................................................4
2.1.机密性与完整性需求...............................................................................................4
2.2.信任机制和公钥基础...............................................................................................5
2.3.鉴别与授权...............................................................................................................5
第三节 威胁网络安全的攻击技术原理...........................................................................6
3.1.黑客技术概述...........................................................................................................6
3.2.拒绝服务攻击 (Denial of Service) .........................................................................6
3.3.缓冲区溢出攻击.......................................................................................................7
3.4.网络监听攻击技术...................................................................................................9
3.5. IP欺骗攻击..............................................................................................................9
3.6.计算机病毒.............................................................................................................10
3.7. Trojan Horse...........................................................................................................11
第四节 现有主要安全技术.............................................................................................11
4.1.物理安全措施.........................................................................................................12
4.2.访问控.....................................................................................................................12
4.3.防火墙技术.............................................................................................................12
4.4.加密技术.................................................................................................................13
4.5 现有安全技术的不足............................................................................................14
4.6网络安全技术发展趋势..........................................................................................14
结束语...............................................................................................................................16
致谢...................................................................................................................................16
参考文献...........................................................................................................................17
部分参考文献
[5] 张小斌. 计算机网络安全工具[M]. 北京: 清华大学出版社 2002.3
[6] 吴金龙. 网络安全[M]. 北京: 高等教育出版社 2004.
[7] 唐正军. 黑客入侵防护系统代码分析[M]. 北京: 机械工业出版社
[8] A. Tanenbaum. Computer Network 3 [M]. Pretice Hall, inc.
[9] 扬守军 黑客技术与网络安全[M]. 北京: 中国对外出版社 2000.
全文17页 约15000字 论述翔实
[摘要]网络安全性是一个涉及面很广泛的问题, 本文从网络安全基础概念入手,对当前计算机网络中存在的各种安全隐患进行了分析,并对由此所带来的各种黑客攻击手段着重分析,严峻的安全问题必然带来与之对应的安全防范技术如:访问控制,入侵检测,加密技术,防火墙等...而防火墙技术是本文要主要论述的内容.
大多数安全性问题的出现都是由于有恶意的人试图获得某种好处或损害某些人而故意引起的。可以看出保证网络安全不仅仅是使它没有编程错误。它包括要防范那些人为恶意破坏.网络安全性可以被粗略地分为4个相互交织的部分:保密、鉴别、反拒认以及完整性控制。保密是保护信息不被未授权者访问,这是人们提到的网络安全性时最常想到的内容。鉴别主要指在揭示敏感信息或进行事务处理之前先确认对方的身份。反拒认主要与签名有关。保密和完整性通过使用注册过的邮件和文件锁来实现。
[关键词] 计算机网络,网络安全,系统漏洞
[Abstract] Security is a broad topic and covers a multitude of sins. I study Network Security from some basic concepts in this paper, for there are lots of potential security problems in computer network and all kinds of invading problems made by hackers, I put weight on these problems. Serious security problems will bring out some security precaution technology, such as visiting control, invading detection, firewall, and firewall technology and IDS is the key of this paper.
Most security problems are intentionally caused by malicious people trying to gain some benefit or harm someone. It should be clear that making a network secure involves some damages made hackers deliberately.
Network security problems can be divided roughly into four intertwined areas: secrecy, authentication, no repudiation, and integrity control. Secrecy has to do with keeping information out of the hands of unauthorized users. This is what usually comes to mind when people think about network security. Authentication deals with determining whom you are talking to before revealing sensitive information or entering into a business deal. No repudiation deals with signatures. Secrecy and integrity are achieved by using registered mail and locking documents up.
[Keywords] Network security Hole of system
目 录
第一节 计算机系统安全中的网络安全...........................................................................3
1.1.引言...........................................................................................................................3
1.2.计算机系统的安全隐患...........................................................................................3
1.3.网络安全的定义与目标...........................................................................................4
1.4.计算机网络所面临的威胁.......................................................................................4
第二节 网络安全基础理论和相关分析...........................................................................4
2.1.机密性与完整性需求...............................................................................................4
2.2.信任机制和公钥基础...............................................................................................5
2.3.鉴别与授权...............................................................................................................5
第三节 威胁网络安全的攻击技术原理...........................................................................6
3.1.黑客技术概述...........................................................................................................6
3.2.拒绝服务攻击 (Denial of Service) .........................................................................6
3.3.缓冲区溢出攻击.......................................................................................................7
3.4.网络监听攻击技术...................................................................................................9
3.5. IP欺骗攻击..............................................................................................................9
3.6.计算机病毒.............................................................................................................10
3.7. Trojan Horse...........................................................................................................11
第四节 现有主要安全技术.............................................................................................11
4.1.物理安全措施.........................................................................................................12
4.2.访问控.....................................................................................................................12
4.3.防火墙技术.............................................................................................................12
4.4.加密技术.................................................................................................................13
4.5 现有安全技术的不足............................................................................................14
4.6网络安全技术发展趋势..........................................................................................14
结束语...............................................................................................................................16
致谢...................................................................................................................................16
参考文献...........................................................................................................................17
部分参考文献
[5] 张小斌. 计算机网络安全工具[M]. 北京: 清华大学出版社 2002.3
[6] 吴金龙. 网络安全[M]. 北京: 高等教育出版社 2004.
[7] 唐正军. 黑客入侵防护系统代码分析[M]. 北京: 机械工业出版社
[8] A. Tanenbaum. Computer Network 3 [M]. Pretice Hall, inc.
[9] 扬守军 黑客技术与网络安全[M]. 北京: 中国对外出版社 2000.