网络安全-1-网络安全摘要:计算机网络安全问题,直接关系到一个国家的政治、军事、经济等领域的安全和稳定。目前黑客猖獗,平均每18秒钟世界上就有一次黑客事件发生。因此,提高对网络安全重要性的认识,增强防范意识,强化防范措施,是保证信息产业持续稳定发展的重要保证和前提条件。文中首先论述了信息网络安全内涵发生的根本变化,阐述了我国发展民族信息安全体系的重要性及建立有中国特色的网络安全体系的必要性,以及网络的安全管理。进一步阐述了网络拓扑结构的安全设计,包括对网络拓扑结构的分析和对网络安全的浅析。然后具体讲述了网络防火墙安全技术的分类及其主要技术特征,防火墙部署原则,并从防火墙部署的位置详细阐述了防火墙的选择标准。同时就信息交换加密技术的分类及RSA算法作了简要的分析,论述了其安全体系的构成。最后分析网络安全技术的研究现状和动向。关键词:网络安全,防火墙,RSA算法AbstractZhuYi(TheComputerDepartmentOfLiuanNormalUniversity,WuhuLiuan241000)Abstract:Thecomputernetworksecurityproblem,directlyrelatestodomaintheandsoonanationalpolitics,military,economysecurityandthestability.Atpresentthehackerisrampant,intheaverageevery18secondsworldshasatimeofhackerattacktooccur.Therefore,enhancestothenetworksecurityimportantunderstanding,enhancementguardconsciousness,thestrengthenedguardmeasure,isguaranteedtheinformationindustriescontinuestheimportantguaranteeandtheprerequisitewhichstablydevelops.Inthearticlefirstelaboratedtheradicalchangewhichtheinformationnetworksecurityconnotationoccurs,elaboratedourcountrydevelopsthenationalityinformationsecuritysystemimportanceandtheestablishmenthastheChinesecharacteristicthenetworksecuritysystemnecessity,aswellasnetworksafetycontrol.Furtherelaboratedthe网络安全-1-networktopologysafedesign,includingtonetworktopologyanalysisandtonetworksecuritybriefanalysis.Thenspecificallynarratedthenetworkfirewallsecuritytechnologyclassificationandit’sthemaintechnicalcharacteristic,thefirewalldeploymentprinciple,andthepositionwhichdeployedfromthefirewallindetailelaboratedthefirewallchoicestandard.MeanwhilehasmadethebriefanalysisontheexchangeofinformationencryptiontechnologyclassificationandtheRSAalgorithm,elaborateditssecuritysystemconstitution.Finallyanalyzesthenetworksecuritytechnologytheresearchpresentsituationandthetrend.Keywords:Networksecurity,firewall,RSAalgorithm网络安全-2-目录网络安全..............................................1目录..............................................2第一章引言.........................................41.1概述.....................................................41.2网络安全技术的研究目的、意义和背景.......................41.3计算机网络安全的含义.....................................5第二章网络安全初步分析...............................62.1网络安全的必要...........................................62.2网络的安全管理...........................................62.2.1安全管理原则...................................................................................................................62.2.2安全管理的实现...............................................................................................................72.3采用先进的技术和产品.....................................72.3.1防火墙技术.......................................................................................................................72.3.2数据加密技术...................................................................................................................72.3.3认证技术...........................................................................................................................82.3.4计算机病毒的防范...........................................................................................................82.4常见的网络攻击及防范对策.................................82.4.1特洛伊木马.......................................................................................................................82.4.4淹没攻击.........................................................................................................................10第三章网络拓扑结构的安全设计........................113.1网络拓扑结构分析........................................113.2网络攻击浅析............................................12第四章防火墙技术....................................144.1防火墙的定义和由来......................................144.2防火墙的选择............................................15网络安全-3-4.3加密技术................................................154.3.1对称加密技术.................................................................................................................164.3.2非对称加密/公开密钥加密...........................................................................................164.3.3RSA算法..........................................................................................................................164.4注册与认证管理..........................................174.4.1认证机构.........................................................................................................................174.4.2注册机构.........................................................................................................................174.4.3密钥备份和恢复.............................................................................................................174.4.4证书管理与撤消系统.....................................................................................................17第五章安全技术的研究.......................................195.1安全技术的研究现状和动向................................195.1.1包过滤型.........................................................................................................................195.1.2代理型..................................................................