专业英语.docx

上传人:b****5 文档编号:6617243 上传时间:2023-01-08 格式:DOCX 页数:8 大小:24.45KB
下载 相关 举报
专业英语.docx_第1页
第1页 / 共8页
专业英语.docx_第2页
第2页 / 共8页
专业英语.docx_第3页
第3页 / 共8页
专业英语.docx_第4页
第4页 / 共8页
专业英语.docx_第5页
第5页 / 共8页
点击查看更多>>
下载资源
资源描述

专业英语.docx

《专业英语.docx》由会员分享,可在线阅读,更多相关《专业英语.docx(8页珍藏版)》请在冰豆网上搜索。

专业英语.docx

专业英语

Communicationtechnologyandinformationtechnologymakesitgraduallyincreaseddependenceoncomputers,butthecomputertoomuchuseofthelifeandworkalsobringsnetworksecurityissuescannotbeignored.Alongwiththecomputerusingthedegreeofdepth,causedduetonetworkattacksincreasinglossofproperty,orevendifficulttoassess.layoutisverycomplexcomputernetworks,hosts,andthehierarchicalrelationshipbetweentheterminalisdifficulttoaccuratelypositioning,combinedwithopeningupthesystem,thesefeaturesmakecomputernetworksvulnerabletohackerattacksandmalicioussoftwareofthetarget,sothesecurityandconfidentialityofonlineinformationisacriticalissue. 

AnOverviewOfComputerNetwork

Currentlytheindustryismoreuniformdefinitionofacomputernetwork,usuallyreferstothecommunicationlinewillbeindifferentpartsofthehostcomputerorterminaldevicesconnectedtogethertoformafull-featured,signalflow,collaborativemanagementinformationsystem,withinthesystemofthekindofoperatinginstructions,networkcommunicationprotocolscantransmitthrough,andtoachieveresourcesharingandinformationtransfer[1]intheevolutionofcomputernetworktechnologylonghistory,hasgonethrougharemoteterminalnetworking,computernetworks,networkinterconnectionandinformationsuperhighwayHighway4stages,fromsimpletocomplexandpresentsthemaintrends. 

RemoteterminalNetworking:

thebeginningofthebirthofthecomputer,computernetworkconsistsofanumberofendhostsandcomposition,betweenthehostandterminalconnectedviaatelephonelineanddirectlycallingtheshotsontheterminal,sothenetworkiscalledterminal-orientedcomputercommunicationnetworksinthisnetwork,thehostisthecenter,therestinavarietyofstand-aloneterminalstar,treeorcross-shapedpatternlayout,becauseallterminalserviceslimitedtheabilityofthehost,sothesystemefficiencyisnothigh. 

ComputerNetworks:

Thestageismainlyoriginatedinthelate1960s,whenthefirsttwogenerationsofcomputernetworkbuiltintheUnitedStates,markingthecomputernetworktechnologyintotheInternetage.Typicalfeatureofthistechnologyisthatthewholesystemisbuiltaroundasetofsubnetsexpansionconstruction,inadditiontothissubnethostandterminaldevicesoutsidethenetworkcomposedoftheformationofa"user-resourcenetwork."SubversionofthefirstgenerationofcommunicationsubnetComputertechnologiestocircuitswitchingmeansforsignaltransmissioninfavorofthepacket-switched,becausethetechnologyisbettersuitedtodatacommunicationsthatreducethecostofcomputernetworkcommunications. 

Networking:

ComputerNetworkTechnologythirdstageofdevelopmenttothe"OSIreferencemodeloperator-type"undertheauspicesofthe3rdgenerationofcomputernetworksasasymbolofthetechnologybytheISOwasfirstproposedin1977,afteryearsofeffortandeventuallydevelopedintotheInternetstandardframework.sinceenteringthe1980s,Internettechnologies,theemergenceofcomputernetworktechnologythemostprofoundchange,andthusledtherapiddevelopmentofcomputernetworktechnology.Internet,alsoknownastheInternationalInternet,itsbuildtoOSI-basedarchitecture,butbasedentirelyonanewframework. 

InformationHighway:

Thestageiscomputernetworktechnologyiscurrentlyexperiencedbystage,mainlybeganinthelate1990s,whichisacomputernetworkintheworld'sboomingperiod,andmainlytoBISDNBroadbandIntegratedServicesDigitalNetworkthedirectionoftheevolutionofcomputernetworktechnologyisalsointhiscontextcanbedeveloped,andin1989builtthefirstoneforapublicpacketswitcheddatacommunicationsnetwork,afterwhichbeganthegradualimplementationofcomputertechnologypopularizationandapplicationinthecountry,ImportantinitiativesincludenationalcoverageofChinesepublicpacketdataswitchingnetworkbuilt,andthe"GoldenBridgeProject","GoldenCardProject","GoldenCustomsProject,""KimJiProject"andaseriesof"gold"wordprojectimplementation. 

TwoComputerNetworkSecurityImpactOfTheMainFactors

Fromthecurrentcomputernetworksecurityrisksofview,thenetworkarisesprincipallyfromtheopennessofthenetwork,thenetworkoperatingsystemvulnerabilities,networkresourcesharing,networksystemdesignflaws,malicioushackerattacksandotherfactors[2]Thefollowingfacedwiththesetypesofriskwereelaborate:

 

Opennessofthenetwork:

Internetisanopensystem,whichleddirectlytoanykindofexternalcomputernetworkaccesscancausesysteminstabilityorevenBencollapseduetotheopencomputernetwork,userscaneasilyfindanonlineenterprises,unitsandindividualssensitiveinformation,whichdirectlyledtoitisinanunsafeenvironment.Topreventsuchsecurityproblemsarise,avarietyoftargetedsecuritymechanisms,strategiesandtoolsareresearchandapplication,butstillneedtodomanyimprovements. 

Networkoperatingsystemvulnerabilities:

Inthetraditionalsecurityanddefensetechnology,thesystem'sbackdoorbecauseofitshiddennatureandignoredbypeople,asthenetworkprotocolsandnetworkservicestoachievecarrier,networkoperatingsystemcannotshirkitsresponsibility,theoperatingsystemrequiresnotonlyprovidesnetworkcommunicationsneedsofthevariousagreementsalsoneedtoimplementnetworkservicesprogram.Duetotheoperatingsystemtoachievenetworkprotocolproceduresareverycomplexandrequirealotofprogramminglanguages​​canbeachieved,andintherealizationoftheprocessofrunningtheprogramdefectsanddeficienciesintheinevitable.Sincetheinvasionofsuchafirewallblockinginsufficient,leadingtosuchintrusionscanlegitimatelythroughthefirewallanddifficulttodetect. 

Networkresourcesharing:

thecomputercanrealizeinformationresourcessharedonthenetwork,whichisthemainpurposeoftheapplicationofcomputernetwork,butthenetworkresourcesharingrisksarisingfromtheissuecannotbeignored.Resourcesharingaspeople'sdependenceoncomputersdeepengraduallyexpanded,butthecurrenttechnologyisdifficulttoachievecompleteisolationexternalservicerequest,anattackerexploittheopportunitytoservicerequestseasilyobtainsensitiveinformationnetworks. 

ThreeMajorDefenseComputerNetworkSecurityCountermeasures

3.1StrengthenTheDailyManagementOfProtection

3.1.1DoNotDownloadUnknownSoftwareAndProcedures

Inthecourseofdailyuseofthecomputer,updatesystempatches,istopreventthevirusfromenteringthebasicrequirements,ifonceinfected,itshouldimmediatelydownloadspecialsoftwaretokilling.Moreover,itshouldnotdownloadsoftwarefromunofficialsites,unidentifiedSoftwaremaybethecarrierofthevirusprogram,oncerunningtheprogrammaycausethecomputertochangedataloss,sochoosereputablewebsitetodownloadsoftwareanddownloadablesoftwareforspecializedandregularantiviruspartitionsaved. 

3.1.2PreventE-MailAttacks

Indailylife,weoftenreceivemessagesfromunknownsources,theclassofmailshouldbehandledcarefully,trynottoopendirectlyinordertoavoidinfringementofthemessagebeingviruspresent,thevirusattachmenttospreadthemessagehasmoreandmore,ifwetheslightestmistakewillinitstrap,maliciouse-mailattacks.e-mailattacks,therearetwomainmethods,andtheperformanceofdifferentforms:

First,e-mailbombing,alsoknownasE-mail"snowball",mainlythroughillegalIPtoattackoccurredshortlymassivespammail,directmailvolumeoverloadcausesparalysis,twoe-mailspoofing,anattackermasqueradingasasystemadministratorbymailrequestingthatpromptstheusertochangetheirpasswordsandotherinformation,andthentheattachedvirusorTrojanhorseprogramisloadedintotheuser'scomputerintrusion.defensesthattypeofattackisrelativelysimple,andsomespecializedmailvirusfilteringsoftwareblockingeffectisobvious. 

3.1.3BrowserSecuritySettings

Webbrowserisalsopartofthevirusofteninvaded,Cookieisduringbrowsingsomewebsitesaresomeofthedataiswrittentotheharddisk,whichrecorduser-specificinformation,sothatwhentheuserbacktothispage,theinformationcanbere-use,souseasecurebrowsersecuritylevelshouldbeset,andturnofftheCook?

ies.howeverbenotedthat,concernedaboutCookieisnotintendedforre-useofsuchinformation,butthedataontheharddiskconcern. 

3.1.4ProtectItsOwnIPAddress

Inthenetworksecurityprotocols,linkintheInternetserverandeveryserviceontheLANterminalhasauniqueIPaddress. Typically,bothfortheuser'sownterms,orintermsofeachother,IPaddressesarehiddenButonthewebchat,chatmessagesbecausetransmissionrequiresbundledIPaddress,thusleadingtotheIPaddresseasilyexposed,whichprovidesanopportunityforthenetworkhackers.hackersgettheuserIPaddressmanyways,buttheuser'stracesortrackinginformationfromtheInternetaccessaccountgetwaymorecommon,butthehackeronceitobtainedanIPaddress,youcancarryoutcyberattacks.Accordingly,indailyusemachineprocessmustdevelopgoodhabits,topreventpersonalinformationleakscriticalinordertoavoidunnecessarylosses.IfyouregularlyuseICQ,preferably"IPPublishing"willbesetup"DonotPublishIPad-dress"electedandonceattacked,norblindlydownloadsoftwareforcleaning,shouldreputablesitetodownloadIPtools,installationandoperationinordertoprotecttheIPaddress. 

3.2InstallationAndConfigurationFirewall

IntheInternet,thenetworkconnection,allusershavedirectaccesstotheout

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 医药卫生

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1