浅析计算机网络安全英文 含中文翻译.docx

上传人:b****5 文档编号:11772565 上传时间:2023-04-01 格式:DOCX 页数:9 大小:23.28KB
下载 相关 举报
浅析计算机网络安全英文 含中文翻译.docx_第1页
第1页 / 共9页
浅析计算机网络安全英文 含中文翻译.docx_第2页
第2页 / 共9页
浅析计算机网络安全英文 含中文翻译.docx_第3页
第3页 / 共9页
浅析计算机网络安全英文 含中文翻译.docx_第4页
第4页 / 共9页
浅析计算机网络安全英文 含中文翻译.docx_第5页
第5页 / 共9页
点击查看更多>>
下载资源
资源描述

浅析计算机网络安全英文 含中文翻译.docx

《浅析计算机网络安全英文 含中文翻译.docx》由会员分享,可在线阅读,更多相关《浅析计算机网络安全英文 含中文翻译.docx(9页珍藏版)》请在冰豆网上搜索。

浅析计算机网络安全英文 含中文翻译.docx

浅析计算机网络安全英文含中文翻译

XXXX学院

计算机专业英语

 

班级计科

学号 12

姓名 

日期2015-12-

 

SecurityofComputerNetworkSystem

Abstract:

Thispaperdiscussedthesecureanddependableproblemaboutthecomputernetworksystem.Onsomeaspects:

theimportanceofnetworksecuritybasictheoryfunctionandthemethodofsolvingaproblemetc.Goodviewsforsolvingtheproblemareputforward.Itstrengthenspeople’sconsciousnessonnetworksecurity.

Keywords:

ComputernetworkVirtualprivatenetworkEncryptiontechniquesFirewall

Introduction:

Alongwiththecomputernetworktechnologydevelopmentthenetworksecurityandthereliabilityhavebecomethequestionofcommoninterestbyallusers.Thepeopleallhopedtheirownnetworksystemcanmovereliablynotexternalintruderdisturbanceanddestruction.Thereforesolvesthenetworksecurityandthereliableproblemcarefullyisaguaranteethenetworknormaloperation’spremiseandsafeguard.

First:

theimportanceofthenetworksecurity.Withtheinformationdevelopingfasttodaythecomputernetworkobtainedthewidespreadapplicationbutalongwiththenetworkinformationtransmissioncapacitygrowingfastersomeorganizationsanddepartmentsbenefitthespeedupwiththeserviceoperationinthenetworkwhilethedatahasalsosufferedtoextentattackanddestruction.Theaggressormayintercepttheinformationinthenetworkstealstheuser’spasswordthedatabaseinformationalsomaytamperwiththedatabasecontenttheforgeusersstatusdeniesownsignature.Andwhatismoretheaggressormaydeletethedatabasecontentthedestroynodereleasescomputervirusandsoon.Thiscausedatasecurityandownbenefithavereceivedtheseriousthreat.AccordingtoAmericanFBIUSFederalBureauofInvestigationinvestthenetworksecuritycreatestheeconomiclosssurpasses17billiondollarseveryyear.75corporationreportfinancelossisbecausethecomputersystemsecurityproblemcreates.Morethan50safethreatcomefrominside.Butonly59losscouldbepossibleestimate.InChinatheeconomiclossamountinviewoffinancialdomainandthebanknegotiablesecuritiescomputersystemsecurityproblemscreateshasreachedashighasseveralhundredmillionYuanalsosometimesoccursinviewofotherprofessionnetworksecuritythreat.Thusitcanbeseenregardlessofisthemeanattackorunconsciousdisoperationwillallbeabletobringtheinestimablelosstothesystem.Thereforethecomputernetworkmusthavetheenoughstrongsecuritymeasure.RegardlessofisinthelocalareanetworkorinWANthenetworksecuritymeasureshouldbeOmni-directionalinviewofeachkindofdifferentthreatandthevulnerabilitysothatitcanguaranteethenetworkinformation’ssecrecytheintegrityandtheusability.

Second:

Networksecurityrationale.InternationalStandardizationOrganizationISOoncesuggestedthecomputersecuritythedefinitionwas:

“Thecomputersystemmustprotectitshardwarethedatanotaccidentallyorrevealsintentionallythechangeandthedestruction.”InordertohelpthecomputeruserdiscriminationandthesolutioncomputernetworksecurityproblemtheAmericanDepartmentofDefenseannounced“theorangepeelbook”orangebookofficialnameis“crediblecomputersystemstandardappraisalcriterion”hascarriedonthestipulationtothemultiusercomputersystemsecurityrankdivision.Theorangepeelbookfromlowtohighdividesintothecomputersecurityfourkindsofsevenlevels:

D1C1C2B1B2B3A1.AboveallD1leveldoesnothavethelowestsafetymarginrankC1andtheC2levelhasthelowestsafetymarginrankB1andtheB2levelhasthemediumsafekeepingofsecurityabilityrankB3andA1belongstothehighestsecurityrating.Inthenetworkconcretedesignprocessitshouldactaccordingtoeachtechnologystandardtheequipmenttypetheperformancerequirementaswellasthefundswhichinthenetworkoverallplanproposedandsoontheoverallevaluationdeterminesonequitereasonablytheperformancehighnetworksecurityrankthusrealizationnetworksecurityandreliability.

Third:

Thenetworksecurityshouldhavefunction.Inordertoadapttheinformationtechnologydevelopmentwellthecomputernetworkapplicationsystemmusthavefollowingfunction:

1Accesscontrol:

Throughtothespecificwebpagetheserviceestablishmentaccesscontrolsysteminarrivestheoverwhelmingmajorityattackimpedimentinfrontoftheattackgoal.2Inspectsthesecurityloophole:

Throughtosecurityloopholecyclicalinspectionevenifattacksmaygettheattackgoalalsomaycausetheoverwhelmingmajorityattacktobeinvalid.3Attackmonitoring:

Throughtospecificwebpageserviceestablishmentattackmonitoringsystembutreal-timeexaminestheoverwhelmingmajorityattackandadoptstheresponsethemotionforexampleseparationnetworkconnectionrecordingattackprocesspursuitattacksourceandsoon.4EncryptionCommunication:

Encryptsonowninitiativethecommunicationmayenabletheaggressortounderstandtherevisionsensitiveinformation.5Authentication:

Thegoodauthenticationsystemmaypreventtheaggressorpretendsthevalidateduser.6Backupandrestoration:

Thegoodbackupandrestoresthemechanismmaycausesthelosseswhentheattackassoonaspossiblerestoresthedataandthesystemservice.7Multi-layeredDefense:

Theaggressorafterbreaksthroughthefirstdefenselinedelaysorblocksittoreachtheattackgoal.8Setsupthesafemonitoringcenter:

Providesthesecuritysystemmanagementthemonitoringtheprotectionandtheemergencycaseservicefortheinformationsystem.

Fourth:

Thenetworksystemsafetycomprehensivesolutionmeasures.IfwanttorealizethenetworksecurityfunctionweshouldcarryontheOmni-directionalguardingtothenetworksystemandthusformulatethequitereasonablenetworksecurityarchitecture.Belowonthenetworksystemsecurityproblemproposessomeguardmeasure.Physicssafemaydivideintotwoaspects:

Oneistheartificialharmtothenetworktheotheristhenetworktotheusers.MostcommonthingistheconstructorwhodidnotunderstandtotheburiedcableclearlythusleadtothedestructionofelectriccablethiskindofsituationmaythroughstandingsymbolizedthesignguardsagainstHasnotusedthestructurewiringthenetworktobeabletoappeartheuserfrequentlytotheelectriccabledamagethisneedstousethestructurewiringtoinstallthenetworkasfaraspossibleArtificialornaturaldisasterinfluencewhentoconsidertheplan.Theaccesscontrolsecuritytheaccesscontroldistinguishesandconfirmstheuserlimitstheuserinthealreadyactivityandtheresourcesscopewhichisauthorized.Thenetworkaccesscontrolsafemayconsiderfromfollowingseveralaspects.1password:

Thenetworksecuritysystemmostouterlayerdefenselineisnetworkusersregisteringintheregistrationprocessthesystemwouldinspecttheusertoregisterthenameandthepasswordvalidityonlythenthelegitimateusercanenterthesystem.2Thenetworkresources’hosttheattributeandthevisitjurisdiction:

Thenetworkresourcesmainlyincludetheresourceswhichsharedfilesthesharedprinternetworkusersandsoonthatallthenetworkuserscanuse.Theresourceswerethehosttomanifestthedifferentusertotheresourcessubordinaterelationssuchasbuildermodifierandgroupmemberandsoon.Theresourcesattributeexpresseditselfdepositandwithdrawalcharacteristicsascanreadbywhowriteortheexecutionandsoon.Thevisitjurisdictionmainlymanifestsintheusertothenetworkresourcesavailabledegreeinusingassignsthenetworkresourcestobethehosttheattributeandthevisitjurisdictionmayeffectivelyintheapplicationcascadecontrolnetworksystemsecurity.3Networksecuritysurveillance:

Thenetworksurveillanceisgenerallycalledfor“thenetworkmanagement”itsfunctionmainlyiscarriesonthedynamicsurveillancetotheentirenetworkmovementandhandleseachkindofeventpromptly.MayunderstandsimplythroughthenetworksurveillancediscoversandsolvesinthenetworksecurityproblemsuchasthelocalizationnetworkfaultpointseizestheIPembezzlerthecontrolnetworkvisitscopeandsoon.4Auditandtrack:

Networkauditandtrackwhichisincludingthenetworkaspectresourcesusenetworkbreakdownandsystemkeeping.Itcomposedgenerallybytwoparts:

Onetherecordingeventsooneachkindofevententirelyrecordsinthedocument.Twocarriesontheanalysisandthestatisticsto.

Datatransmissionsecurity,transmissionsecurityrequirementstoprotecttheinformationonthenetworkistransmittedtopreventthepassiveandactiveviolations.Thesecurityofdatatransmissioncantakethefollowingmeasures:

(1)encryptionanddigitalsignature:

digitalsignatureisthereceiverofdatausedtoconfirmthesenderofthedataistrueandcorrect.

(2)firewall:

firewall(Firewall)isasecuritymeasurethatiswidelyusedinInternet.Itcanbeusedtosetupaseriesofcomponentsindifferentnetworkornetworksecuritydomain.Itcandetect,limitandchangethedataflowofthefirewall,anddetecttheinformation,structureandrunningstatusofthenetworkasfaraspossible,soastorealizethenetworksecurity.(3)UsernameorPasswordcertification:

theauthenticationmethodisthemostcommonlyusedasanauthenticationmethodfortheoperatingsystem,telnet(remotelogin),rlogin(remotelogin),buttheprocessisnotencrypted,thatis,passwordiseasytobemonitoredanddecryption.(4)authenticationusingthealgorithm:

radius(RemoteAuthenticationDialprotocol,OSPF(openroutingprotocol),SNMPSecurityProtocolusesharedSecurityKey(key),andtheabstractalgorithm(MD5)certification,butabstractalgorithmisanirreversibleprocess,ther

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 工程科技 > 能源化工

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1