专业英语.docx
- 文档编号:6617243
- 上传时间:2023-01-08
- 格式:DOCX
- 页数:8
- 大小:24.45KB
专业英语.docx
《专业英语.docx》由会员分享,可在线阅读,更多相关《专业英语.docx(8页珍藏版)》请在冰豆网上搜索。
专业英语
Communicationtechnologyandinformationtechnologymakesitgraduallyincreaseddependenceoncomputers,butthecomputertoomuchuseofthelifeandworkalsobringsnetworksecurityissuescannotbeignored.Alongwiththecomputerusingthedegreeofdepth,causedduetonetworkattacksincreasinglossofproperty,orevendifficulttoassess.layoutisverycomplexcomputernetworks,hosts,andthehierarchicalrelationshipbetweentheterminalisdifficulttoaccuratelypositioning,combinedwithopeningupthesystem,thesefeaturesmakecomputernetworksvulnerabletohackerattacksandmalicioussoftwareofthetarget,sothesecurityandconfidentialityofonlineinformationisacriticalissue.
AnOverviewOfComputerNetwork
Currentlytheindustryismoreuniformdefinitionofacomputernetwork,usuallyreferstothecommunicationlinewillbeindifferentpartsofthehostcomputerorterminaldevicesconnectedtogethertoformafull-featured,signalflow,collaborativemanagementinformationsystem,withinthesystemofthekindofoperatinginstructions,networkcommunicationprotocolscantransmitthrough,andtoachieveresourcesharingandinformationtransfer[1]intheevolutionofcomputernetworktechnologylonghistory,hasgonethrougharemoteterminalnetworking,computernetworks,networkinterconnectionandinformationsuperhighwayHighway4stages,fromsimpletocomplexandpresentsthemaintrends.
RemoteterminalNetworking:
thebeginningofthebirthofthecomputer,computernetworkconsistsofanumberofendhostsandcomposition,betweenthehostandterminalconnectedviaatelephonelineanddirectlycallingtheshotsontheterminal,sothenetworkiscalledterminal-orientedcomputercommunicationnetworksinthisnetwork,thehostisthecenter,therestinavarietyofstand-aloneterminalstar,treeorcross-shapedpatternlayout,becauseallterminalserviceslimitedtheabilityofthehost,sothesystemefficiencyisnothigh.
ComputerNetworks:
Thestageismainlyoriginatedinthelate1960s,whenthefirsttwogenerationsofcomputernetworkbuiltintheUnitedStates,markingthecomputernetworktechnologyintotheInternetage.Typicalfeatureofthistechnologyisthatthewholesystemisbuiltaroundasetofsubnetsexpansionconstruction,inadditiontothissubnethostandterminaldevicesoutsidethenetworkcomposedoftheformationofa"user-resourcenetwork."SubversionofthefirstgenerationofcommunicationsubnetComputertechnologiestocircuitswitchingmeansforsignaltransmissioninfavorofthepacket-switched,becausethetechnologyisbettersuitedtodatacommunicationsthatreducethecostofcomputernetworkcommunications.
Networking:
ComputerNetworkTechnologythirdstageofdevelopmenttothe"OSIreferencemodeloperator-type"undertheauspicesofthe3rdgenerationofcomputernetworksasasymbolofthetechnologybytheISOwasfirstproposedin1977,afteryearsofeffortandeventuallydevelopedintotheInternetstandardframework.sinceenteringthe1980s,Internettechnologies,theemergenceofcomputernetworktechnologythemostprofoundchange,andthusledtherapiddevelopmentofcomputernetworktechnology.Internet,alsoknownastheInternationalInternet,itsbuildtoOSI-basedarchitecture,butbasedentirelyonanewframework.
InformationHighway:
Thestageiscomputernetworktechnologyiscurrentlyexperiencedbystage,mainlybeganinthelate1990s,whichisacomputernetworkintheworld'sboomingperiod,andmainlytoBISDNBroadbandIntegratedServicesDigitalNetworkthedirectionoftheevolutionofcomputernetworktechnologyisalsointhiscontextcanbedeveloped,andin1989builtthefirstoneforapublicpacketswitcheddatacommunicationsnetwork,afterwhichbeganthegradualimplementationofcomputertechnologypopularizationandapplicationinthecountry,ImportantinitiativesincludenationalcoverageofChinesepublicpacketdataswitchingnetworkbuilt,andthe"GoldenBridgeProject","GoldenCardProject","GoldenCustomsProject,""KimJiProject"andaseriesof"gold"wordprojectimplementation.
TwoComputerNetworkSecurityImpactOfTheMainFactors
Fromthecurrentcomputernetworksecurityrisksofview,thenetworkarisesprincipallyfromtheopennessofthenetwork,thenetworkoperatingsystemvulnerabilities,networkresourcesharing,networksystemdesignflaws,malicioushackerattacksandotherfactors[2]Thefollowingfacedwiththesetypesofriskwereelaborate:
Opennessofthenetwork:
Internetisanopensystem,whichleddirectlytoanykindofexternalcomputernetworkaccesscancausesysteminstabilityorevenBencollapseduetotheopencomputernetwork,userscaneasilyfindanonlineenterprises,unitsandindividualssensitiveinformation,whichdirectlyledtoitisinanunsafeenvironment.Topreventsuchsecurityproblemsarise,avarietyoftargetedsecuritymechanisms,strategiesandtoolsareresearchandapplication,butstillneedtodomanyimprovements.
Networkoperatingsystemvulnerabilities:
Inthetraditionalsecurityanddefensetechnology,thesystem'sbackdoorbecauseofitshiddennatureandignoredbypeople,asthenetworkprotocolsandnetworkservicestoachievecarrier,networkoperatingsystemcannotshirkitsresponsibility,theoperatingsystemrequiresnotonlyprovidesnetworkcommunicationsneedsofthevariousagreementsalsoneedtoimplementnetworkservicesprogram.Duetotheoperatingsystemtoachievenetworkprotocolproceduresareverycomplexandrequirealotofprogramminglanguagescanbeachieved,andintherealizationoftheprocessofrunningtheprogramdefectsanddeficienciesintheinevitable.Sincetheinvasionofsuchafirewallblockinginsufficient,leadingtosuchintrusionscanlegitimatelythroughthefirewallanddifficulttodetect.
Networkresourcesharing:
thecomputercanrealizeinformationresourcessharedonthenetwork,whichisthemainpurposeoftheapplicationofcomputernetwork,butthenetworkresourcesharingrisksarisingfromtheissuecannotbeignored.Resourcesharingaspeople'sdependenceoncomputersdeepengraduallyexpanded,butthecurrenttechnologyisdifficulttoachievecompleteisolationexternalservicerequest,anattackerexploittheopportunitytoservicerequestseasilyobtainsensitiveinformationnetworks.
ThreeMajorDefenseComputerNetworkSecurityCountermeasures
3.1StrengthenTheDailyManagementOfProtection
3.1.1DoNotDownloadUnknownSoftwareAndProcedures
Inthecourseofdailyuseofthecomputer,updatesystempatches,istopreventthevirusfromenteringthebasicrequirements,ifonceinfected,itshouldimmediatelydownloadspecialsoftwaretokilling.Moreover,itshouldnotdownloadsoftwarefromunofficialsites,unidentifiedSoftwaremaybethecarrierofthevirusprogram,oncerunningtheprogrammaycausethecomputertochangedataloss,sochoosereputablewebsitetodownloadsoftwareanddownloadablesoftwareforspecializedandregularantiviruspartitionsaved.
3.1.2PreventE-MailAttacks
Indailylife,weoftenreceivemessagesfromunknownsources,theclassofmailshouldbehandledcarefully,trynottoopendirectlyinordertoavoidinfringementofthemessagebeingviruspresent,thevirusattachmenttospreadthemessagehasmoreandmore,ifwetheslightestmistakewillinitstrap,maliciouse-mailattacks.e-mailattacks,therearetwomainmethods,andtheperformanceofdifferentforms:
First,e-mailbombing,alsoknownasE-mail"snowball",mainlythroughillegalIPtoattackoccurredshortlymassivespammail,directmailvolumeoverloadcausesparalysis,twoe-mailspoofing,anattackermasqueradingasasystemadministratorbymailrequestingthatpromptstheusertochangetheirpasswordsandotherinformation,andthentheattachedvirusorTrojanhorseprogramisloadedintotheuser'scomputerintrusion.defensesthattypeofattackisrelativelysimple,andsomespecializedmailvirusfilteringsoftwareblockingeffectisobvious.
3.1.3BrowserSecuritySettings
Webbrowserisalsopartofthevirusofteninvaded,Cookieisduringbrowsingsomewebsitesaresomeofthedataiswrittentotheharddisk,whichrecorduser-specificinformation,sothatwhentheuserbacktothispage,theinformationcanbere-use,souseasecurebrowsersecuritylevelshouldbeset,andturnofftheCook?
ies.howeverbenotedthat,concernedaboutCookieisnotintendedforre-useofsuchinformation,butthedataontheharddiskconcern.
3.1.4ProtectItsOwnIPAddress
Inthenetworksecurityprotocols,linkintheInternetserverandeveryserviceontheLANterminalhasauniqueIPaddress. Typically,bothfortheuser'sownterms,orintermsofeachother,IPaddressesarehiddenButonthewebchat,chatmessagesbecausetransmissionrequiresbundledIPaddress,thusleadingtotheIPaddresseasilyexposed,whichprovidesanopportunityforthenetworkhackers.hackersgettheuserIPaddressmanyways,buttheuser'stracesortrackinginformationfromtheInternetaccessaccountgetwaymorecommon,butthehackeronceitobtainedanIPaddress,youcancarryoutcyberattacks.Accordingly,indailyusemachineprocessmustdevelopgoodhabits,topreventpersonalinformationleakscriticalinordertoavoidunnecessarylosses.IfyouregularlyuseICQ,preferably"IPPublishing"willbesetup"DonotPublishIPad-dress"electedandonceattacked,norblindlydownloadsoftwareforcleaning,shouldreputablesitetodownloadIPtools,installationandoperationinordertoprotecttheIPaddress.
3.2InstallationAndConfigurationFirewall
IntheInternet,thenetworkconnection,allusershavedirectaccesstotheout
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 专业 英语