本文《Computer network attacks and prevent》旨在介紹現(xiàn)在的網(wǎng)絡(luò)安全問題,網(wǎng)絡(luò)攻擊的方式,步驟,防范。經(jīng)英國dissertation網(wǎng)-留學(xué)生dissertation代寫專區(qū)之計算機網(wǎng)絡(luò)版塊的專業(yè)導(dǎo)師修飾和加工。
Abstract: Internet security and confidentiality of information is a critical issue. Whether in the LAN or WAN, there are both natural and man-made factors, such as the vulnerability and potential threats.
Key words: computer; network; security; prevent
Introduction:This paper aims to introduce the current issue of network security, network attack methods, steps to prevent. The structure of the firewall, type, and specific applications. So that in general have to guard against network attacks can be used for killing the firewall and virus protection.
The Main body:
Network security is the security of computer information systems in an important aspect. As the opening of Pandora's Box, the computer systems of the Internet, greatly expanded information resources sharing space at the same time, will be exposed in http://www.mythingswp7.com/dissertation_sample/ their own malicious more under attack. How to ensure that network storage, security and the transmission of information security, is the so-called computer network security. Information security is to prevent information from the property have been deliberately or accidentally leaked authorized illegal, altered, damage or illegal information system identification, control; ensure confidentiality, integrity, availability, controllable. Information security, including operating system security, database security, network security, virus protection, access control, encryption and identification of seven areas. Design of a network security system, we must not only effectively prevent the system to a wide range of network attacks, guarantee the safety of the system, and also have a higher cost-effectiveness, operational simplicity, and transparent to the user interface and friendly.
In the form of network security attacks,there are four main ways L interruption,interception, modification and forgery.
Interruption of availability is the object of the attack, which destroyed the system resources, so that the network is not available.
Intercepted by the object of the attack the confidentiality, non-authorized users access to a means of access to system resources.
Modify the object of the attack on the integrity, non-authorized users gain access not only data but also to be amended.
Forged by the integrity of the object of the attack, non-authorized users to insert forged data to normal data transmission.
Network security solutions
First, the deployment of Intrusion Detection System
Ability of intrusion detection is a measure of an effective defense system is an important factor in a complete, powerful intrusion detection system, a complete firewall can make up for the relative lack of static defense. From the external network and the campus network of the various acts of real-time detection, to detect all possible attempts to attack and take corresponding measures. Specifically, intrusion detection is to switch on #p#分頁標(biāo)題#e#http://www.mythingswp7.com/dissertation_sample/ the engine access center. Intrusion Detection System Intrusion Detection set, network management and network monitoring functions, both inside and outside the network in real-time capture of all data transmission between the use of built-in features of database attacks, the use of pattern matching and intelligence analysis to detect the occurrence of network intrusions and anomalies, and in the database record of the incident, as a network administrator based on hindsight; if in serious condition, the system real-time warning can be issued so that the school administrators to take timely measures to deal with.
Second, vulnerability scanning system
Using the most advanced system of regular vulnerability scanning workstations, servers, switches and other safety checks, and in accordance with the results to the system administrator to provide detailed and reliable analysis of the security, to enhance the overall level of network security have an important basis.
Third, the network version of the deployment of antivirus products
In the network anti-virus program, we eventually have to reach a goal is: To put an end to the LAN in the whole virus infection, dissemination and attack, in order to achieve this, we should be in the entire network at risk of infection and the spread of the virus to take place The anti-virus tools. At the same time in order to effectively and quickly implement and manage the entire network of anti-virus system, should be able to remotely install, smart upgrade, remote alarm, centralized management, distribution of a variety of functions such as killing.
Forth, the network host operating system security and physical security measures
Network firewall as the first line of defense and can not fully protect the internal network, must be combined with other measures to improve the safety of the system level. After the firewall is based on the network host operating system security and physical http://www.mythingswp7.com/dissertation_sample/ security measures. In accordance with the level from low to high, namely, the physical security of the host system, the core operating system security, system security, application services security and file system security; At the same time, host security checks and bug fixes, as well as a backup safety system as a supplementary safety measures. These constitute the entire network system, the second line of defense, the main part of a breakthrough to prevent the firewall as well as attacks from within. System backup is the last line of defense network system, used to attack after the System Restore. The firewall and host security measures is the overall system security by auditing, intrusion detection and response processor constitute the overall safety inspection and response measures. It from the network system firewall, network host or even directly from the network link layer on the extraction of network status information, as input to the intrusion detection subsystem. Intrusion Detection System in accordance with certain rules to determine whether there is any invasion of the incident, if the invasion occurred, the emergency treatment measures, and generate a warning message. Moreover, the system's security audit also can be used as the future consequences of aggressive behavior and to deal with security policy on the system to improve sources of information.#p#分頁標(biāo)題#e#
Summary: Network security is a comprehensive issue, involving technology, management, use and many other aspects, including both its own information system security issues, there are physical and logical technical measures, a kind of technology can only solve the problem on the one hand, rather than a panacea.
References:
[1] Huang Yi-qiang, et al. On the software development needs analysis phase of the main tasks. Quarterly Journal of Sun Yat-sen University, 2002 (01).
[2] Hu Daoyuan. Computer LAN [M]. Beijing: Tsinghua University Press, 2001.
[3] Zhu Lisen, even Shougong. Computer Network Application Technology [M]. Beijing: Patent Literature Publishing House, 2001.
[4] Xie Xiren. Computer Networks (4th edition) [M]. Beijing: Publishing House of Electronics Industry, 2003.
[5]Sun Xiaogang, Han Dong, et al. Oriented software engineering, Visual C + + Network Programming [M]. Beijing: Tsinghua University Press, 2004,11.
以上文章供計算機專業(yè)留學(xué)生們參考下載,更精彩的留學(xué)生dissertation代寫范文可在本站搜索,本站提供專業(yè)的英國dissertation服務(wù),包含代寫留學(xué)生dissertation服務(wù),歡迎有需要者來電咨詢與洽談。
相關(guān)文章
UKthesis provides an online writing service for all types of academic writing. Check out some of them and don't hesitate to place your order.