《On the computer network security problems and preventive measures(计算机网络安全问题和预防措施)》由会员分享,可在线阅读,更多相关《On the computer network security problems and preventive measures(计算机网络安全问题和预防措施)(9页珍藏版)》请在金锄头文库上搜索。
1、1On the computer network security problems and preventive measuresPapers: Paper Keywords computer network security operating system computer virus hacking prevention measures Abstract With the rapid development of computer network technology and application of computer network system gives users a l
2、ot of insecurity problems, computer network security has been more and more people attach great importance to this paper from the calculation of network security analysis of the main problems facing the proposed effective preventive measures, the purpose of a computer network for people to play a bi
3、gger and better role. With the rapid development of computer network technology and application of computer network security is more and more people attach great importance to research computer network security precautions become an inevitable trend. Computer network security is a complex system eng
4、ineering, effective preventive measures involving management, equipment and 2technology and other factors, this article from the calculation of network security analysis of the main problems facing the proposed effective network security precautions, let the computer network Better for people to pla
5、y a greater role. First, the computer network security reference ISO International Organization for Standardization definition about computer security, computer network security is generally taken to refer to the appropriate management, technology and measures to protect the computer network system
6、hardware, software and data resources are not being changed, disclosure and destruction so that normal operation of the computer network system, so better to play a greater role in the network. common computer network security problems are mainly to intranet, extranet, and network management. Second
7、, the computer network security a major problem facing Computer Viruses Computer viruses PRC Computer Information System Security 3Protection Ordinance “was clearly defined (Computer Virus is a computer program prepared by inserting in the destruction of computer functions or destruction of data, an
8、d can affect self-replicating computer uses a set of computer instructions or code of computer viruses hidden, latent, destructive and infectious characteristics. current computer network security is the most common computer virus harm, in the face a wide variety of computer virus, which caused grea
9、t harm to spread fast, many forms of communication, especially the spread of the virus through the network, such as: network worms, Trojans, Stuxnet, flames and other viruses on the computer network of more destructive, clear more difficult, is the biggest headache for computer users face network se
10、curity issues. 2.IP address theft Often occur in the LAN IP address of the phenomenon of theft, will appear on the users computer when the IP address is occupied prompt dialog box, causing the user does not use the Internet. Unauthorized use of the IP address permissions are generally high, thieves
11、often pass network to hide the 4identity of the user harassment and destruction, cause greater damage to the user, serious violations of the legitimate rights and interests of users use the network, resulting in network security is a great threat. 3 network hacker attacks hackers is through the Inte
12、rnet attackers unauthorized access to the user network, sabotage and attacks, the danger is determined by the hackers motives, some hackers out of curiosity or just spy on a users secret privacy, do not destroy the computer system, endangering not great and some hackers because of anger, revenge, pr
13、otest, trespassing target for tampering user pages and content, idea of trying to humiliate and attack the user, resulting in serious adverse effects, forcing down the network and some malicious hackers mainly engaged in attack and destroy, destroy invading the users computer system, important data
14、from being tampered with, damaged, deleted, such as theft of national defense, military and political secrets, harm the collective and individual interests, endanger national security, illegal use of bank deposit accounts to extract others, or network 5extortion and fraud. shows that hacking attacks
15、 against computer networks and destruction consequences will be disastrous. 4 spam spam flood to destroy the network environment generally refers not been forcibly sent to the user license the e-mail users mailbox. The proliferation of spam has made the Internet network overwhelmed. Lots of spam mes
16、sages in the network transmission, a violation of privacy and personal mailbox recipient space, taking up network bandwidth, causing the server congestion, seriously affecting the transmission capacity of the network information reduces the operating efficiency of the network. 5 computer network security management in place computer network security management institutions are not perfect, job responsibilities is unknown, manage passwords and permissions con