Abstract-Withtherapiddevelopmentofcomputernetworktechnology,thesecurityofcomputernetworkbecomesincreasinglyimportant.Threemainthreatsfacingcomputernetworksecurityinclude:hackers,computervirusanddenialofserviceattack.Thingsleadingtothesafetyofthenetworkaremainly:resourcessharing,datacommunication,computervirusandTCP/IPprotocolsecurityflaws.Asafetynetworksystemshouldincludeatleastthreekindsofmeasures:legalmeasures,technicalmeasuresandreviewandmanagementmeasures.Thepaperanalyzesthemainthreatfacingcomputernetworksecurity,discussesnetworksecuritytechnologyandadvancessomeeffectivecountermeasuresinviewofthehiddendangerofcurrentcommonnetworksecurity.Keywords-networksecurity;computernetwork;informationsecurity;securitystrategy;preventionstrategyI.INTRODUCTIONWiththedevelopmentofInternettechnology,computernetworkgraduallychangespeople'slifeandwayofwork.Intheprocessofrapidpopularizationofcomputernetwork,hiddendangersofcomputersecuritybecomeincreasinglyprominent.Thisrequiresustakestrongmeasurestoensurethesafetyofthenetwork.Thecomputernetworksecurityreferstotheuseofnetworkmanagementtocontrolandtechnicalmeasurestoensuredataprivacyinanetworkenvironment.Butascomputernetworkisopen,sharingandinternational,itmakescomputernetworkmorevulnerable.Inordertosolvethisproblem,nowpeoplemainlyresearchinthefieldofdataencryptiontechnology,identityauthentication,firewall,networkmanagementandthatsortofthings[l].AI.CONCEPTOFCOMPUTERNETWORKSECURITYThecomputernetworksecurityreferstotheuseofnetworkmanagementtocontrolandtechnicalmeasurestoensurethatinanetworkenvironment,thedataprivacy,integrityandavailabilitycanbeprotected.Thecomputernetworksecurityincludestwoaspects:physicalsecurityandlogicsecurity.Thephysicalsecuritysystemmeansthatequipmentandrelatedfacilitiesareprotectedfromdestruction,loss,etc.Logicsecurityincludestheintegrityofinformation,secrecyandavailability.Themeaningofcomputernetworksecurityvariesfromuserstousers.Differentusershavedifferentunderstandingofnetworksafetyrequirements.Togeneraluserswhomayjustwantindividualprivacyorconfidentialinformationonthenetworktransmissiontobeprotectedandtoavoidbeingeavesdropping,tamperingandforge.Butfornetworkproviders,theynotonlycareaboutthenetworkinformationsafety,butalsoconsiderhowtocopewithsuddennaturaldisasters,suchasamilitarystriketonetworkhardwaredamage,aswellashowtorestorenetworkcommunicationandmaintainthecontinuityofnetworkcommunicationinabnormalsituations.Essentially,networksecurityincludehardwarethatcomposenetworksystem,softwareanditstransferoveranetworkinformationsafety,whichprotecteditfromaccidentalormaliciousattack,networksecurityconcernsbothtechnicalproblemsandmanagementissues,whichareincomplementwitheachother.BI.MAJORTHREATSOFCOMPUTERNETWORKA.InternalinterceptionandDestructionThepeopleinsideofnetworksystemmaybecomethefollowingpossiblethreats:internalconfidentialpersonnel'sintentionallyorunintentionallyleaks,thechangeoftherecordinformation;internalunauthorizedpersonnel'sintentionallyornot,stealingconfidentialinformation,changethenetworkconfigurationandrecordinformation;networksystemdamagefromInternalpersonnel.B.UnauthorizedAccessUnauthorizedaccessreferstotheunauthorizeduseofnetworkresourcesorunauthorizedwaystousethenetworkresources.Itincludesillegalusers'hackingintothenetworkorillegaloperationsystem,andlegitimateusers'unauthorizedwayofoperation.C.DamagetheIntegrityofInformationAttackersmaydamagetheinformationintegrityfromthreeaspects:changingtheorderoftheinformationflow,timing,changingthecontent,theformofinformation;Deletingnewsorsomeofthenews;andInsertingsomeinformationinthenews,makingthereceivernotabletoreadorreceivethewronginformation[2].D.InterceptionThroughthewiretappingortheelectromagneticwaveradiationwithinthescopeoftheinstallation,theattackermayinterceptconfidentialinformation,orthroughtotheinformationflow,communicationfrequencyandlengthof6452012InternationalConferenceonComputerScienceandInformationProcessing(CSIP)theparametersfindoutusefulinformation.Itdoesnotdamagethetransferinformation,anditisnoteasyexaminable.E.PretendingTheattackermaypretendtodothefollowing:pretendtobeleadershipissueordersandreadthedocuments;Pretendtobehostdeceivelegitimatehostsandlegitimateusers.Pretendtobenetworkcontrolprogramtoshowormodifytheaccesstokeyinformation,passwords,etc,excessiveuseofnetworkequipmentandresources:takeoveralegitimateuser,cheatthesystem,takeuptheresourcesofthelegitimateusers.F.DestroySystemAvailability.Theattackermaydamagefromthefollowingaspectsofnetworksystemavailability:makingalegitimateusernotabletohavenormalaccesstothenetworkresources;Makingastricttimerequiredservicenotabletogetthetimelyresponseanddestroysystem.G.RepeatItselfRepeatitselfrefersthattheattackerinterceptedandrecordinformation,andthensendtheseinformationrepeatedlywhennecessary.H.DenialPossibledenialsarethesender'slaterdenialofsendingapieceofnewscontent;thereceiverlaterdeniedthathehadreceivedamessageearlier.1.OtherThreatsThethreatsofnetworksystemalsoincludecomputervirus,electromagneticleakage,allkindsofdisasters,andt