计算机网络通信英文论文及翻译

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

Abstract-Withtherapiddevelopmentofcomputernetworktechnology,thesecurityofcomputernetworkbecomesincreasinglyimportant.Threemainthreatsfacingcomputernetworksecurityinclude:hackers,computervirusanddenialofserviceattack.Thingsleadingtothesafetyofthenetworkaremainly:resourcessharing,datacommunication,computervirusandTCP/IPprotocolsecurityflaws.Asafetynetworksystemshouldincludeatleastthreekindsofmeasures:legalmeasures,technicalmeasuresandreviewandmanagementmeasures.Thepaperanalyzesthemainthreatfacingcomputernetworksecurity,discussesnetworksecuritytechnologyandadvancessomeeffectivecountermeasuresinviewofthehiddendangerofcurrentcommonnetworksecurity.Keywords-networksecurity;computernetwork;informationsecurity;securitystrategy;preventionstrategyI.INTRODUCTIONWiththedevelopmentofInternettechnology,computernetworkgraduallychangespeople'slifeandwayofwork.Intheprocessofrapidpopularizationofcomputernetwork,hiddendangersofcomputersecuritybecomeincreasinglyprominent.Thisrequiresustakestrongmeasurestoensurethesafetyofthenetwork.Thecomputernetworksecurityreferstotheuseofnetworkmanagementtocontrolandtechnicalmeasurestoensuredataprivacyinanetworkenvironment.Butascomputernetworkisopen,sharingandinternational,itmakescomputernetworkmorevulnerable.Inordertosolvethisproblem,nowpeoplemainlyresearchinthefieldofdataencryptiontechnology,identityauthentication,firewall,networkmanagementandthatsortofthings[l].AI.CONCEPTOFCOMPUTERNETWORKSECURITYThecomputernetworksecurityreferstotheuseofnetworkmanagementtocontrolandtechnicalmeasurestoensurethatinanetworkenvironment,thedataprivacy,integrityandavailabilitycanbeprotected.Thecomputernetworksecurityincludestwoaspects:physicalsecurityandlogicsecurity.Thephysicalsecuritysystemmeansthatequipmentandrelatedfacilitiesareprotectedfromdestruction,loss,etc.Logicsecurityincludestheintegrityofinformation,secrecyandavailability.Themeaningofcomputernetworksecurityvariesfromuserstousers.Differentusershavedifferentunderstandingofnetworksafetyrequirements.Togeneraluserswhomayjustwantindividualprivacyorconfidentialinformationonthenetworktransmissiontobeprotectedandtoavoidbeingeavesdropping,tamperingandforge.Butfornetworkproviders,theynotonlycareaboutthenetworkinformationsafety,butalsoconsiderhowtocopewithsuddennaturaldisasters,suchasamilitarystriketonetworkhardwaredamage,aswellashowtorestorenetworkcommunicationandmaintainthecontinuityofnetworkcommunicationinabnormalsituations.Essentially,networksecurityincludehardwarethatcomposenetworksystem,softwareanditstransferoveranetworkinformationsafety,whichprotecteditfromaccidentalormaliciousattack,networksecurityconcernsbothtechnicalproblemsandmanagementissues,whichareincomplementwitheachother.BI.MAJORTHREATSOFCOMPUTERNETWORKA.InternalinterceptionandDestructionThepeopleinsideofnetworksystemmaybecomethefollowingpossiblethreats:internalconfidentialpersonnel'sintentionallyorunintentionallyleaks,thechangeoftherecordinformation;internalunauthorizedpersonnel'sintentionallyornot,stealingconfidentialinformation,changethenetworkconfigurationandrecordinformation;networksystemdamagefromInternalpersonnel.B.UnauthorizedAccessUnauthorizedaccessreferstotheunauthorizeduseofnetworkresourcesorunauthorizedwaystousethenetworkresources.Itincludesillegalusers'hackingintothenetworkorillegaloperationsystem,andlegitimateusers'unauthorizedwayofoperation.C.DamagetheIntegrityofInformationAttackersmaydamagetheinformationintegrityfromthreeaspects:changingtheorderoftheinformationflow,timing,changingthecontent,theformofinformation;Deletingnewsorsomeofthenews;andInsertingsomeinformationinthenews,makingthereceivernotabletoreadorreceivethewronginformation[2].D.InterceptionThroughthewiretappingortheelectromagneticwaveradiationwithinthescopeoftheinstallation,theattackermayinterceptconfidentialinformation,orthroughtotheinformationflow,communicationfrequencyandlengthof6452012InternationalConferenceonComputerScienceandInformationProcessing(CSIP)theparametersfindoutusefulinformation.Itdoesnotdamagethetransferinformation,anditisnoteasyexaminable.E.PretendingTheattackermaypretendtodothefollowing:pretendtobeleadershipissueordersandreadthedocuments;Pretendtobehostdeceivelegitimatehostsandlegitimateusers.Pretendtobenetworkcontrolprogramtoshowormodifytheaccesstokeyinformation,passwords,etc,excessiveuseofnetworkequipmentandresources:takeoveralegitimateuser,cheatthesystem,takeuptheresourcesofthelegitimateusers.F.DestroySystemAvailability.Theattackermaydamagefromthefollowingaspectsofnetworksystemavailability:makingalegitimateusernotabletohavenormalaccesstothenetworkresources;Makingastricttimerequiredservicenotabletogetthetimelyresponseanddestroysystem.G.RepeatItselfRepeatitselfrefersthattheattackerinterceptedandrecordinformation,andthensendtheseinformationrepeatedlywhennecessary.H.DenialPossibledenialsarethesender'slaterdenialofsendingapieceofnewscontent;thereceiverlaterdeniedthathehadreceivedamessageearlier.1.OtherThreatsThethreatsofnetworksystemalsoincludecomputervirus,electromagneticleakage,allkindsofdisasters,andt

1 / 21
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功