計算機信息系統(tǒng)英文畢業(yè)論文_第1頁
已閱讀1頁,還剩12頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領

文檔簡介

1、<p>  Computer Network Information Security And Protection Strategy</p><p>  Prepared by</p><p>  Jilin University ---Lambton College</p><p>  Prepared for</p><p>

2、  Program committee</p><p>  Northwood University/ Jilin University---Lambton College</p><p>  TABLE OF CONTENS</p><p>  Letter of Transmittal………………………………………………………………ii</p>&

3、lt;p>  Executive Summary….............................................................................................iii</p><p>  Introduction……………………………………………………………………1</p><p>  Purpose…………

4、…………………………………………………………1</p><p>  Background………………………………………………………………..1</p><p>  Methodology……………………………………………………………....2</p><p>  Procedure and Findings…………………………………………..............

5、.......4</p><p>  Hide IP address………………………………………………………….....4</p><p>  Sealed hackers"back door"………………………………………………...4</p><p>  Delete unnecessary protocols…………………………………….

6、.5</p><p>  Prohibit the establishment of air link……………………………..5</p><p>  Turn off unnecessary services.........................................................5</p><p>  Do IE'

7、s security settings…………………………………………………...5</p><p>  Trojans guard……………………………………………………...............6</p><p>  3.0Conclusions……………………………………………………………………6</p><p>  Referenences………………

8、……………………………………………………….7</p><p>  Appendix……………………………………………………………………………8</p><p>  Letter of Transmittal</p><p><b>  Shan Xi</b></p><p><b>  2013/6/10&l

9、t;/b></p><p>  Program Committee</p><p>  Northwood university/JULC</p><p>  4000 Whiting Drive</p><p>  Midland, MI, U.S.A</p><p>  Dear Program Commit

10、tee:</p><p>  Here is my report, Computer Network Information Security And Protection Strategy, which you asked for on july 12, 2013.</p><p>  With the rapid development of Internet technology,

11、computer network access and exchange has become the most important means of information communication. Information network involving national governments, military, culture, education and many other areas; Many of them a

12、re even sensitive information is a state secret, So inevitably will attack, The network system faces a serious threat and become a serious social problem. The report introduced network information security policies. In t

13、he follow</p><p>  Sincerely,</p><p>  Executive Summary</p><p>  In recent years, availability of more emphasis on convenience and nonnetwork the neglect of the network security.Wh

14、en the network issued to convey information,it is not obvious.Ina key operation,such as banks and other important business.When the main business of the company on the network.When more and more activities of government

15、department sin the network operation,network security has become a problem can not be ignored.With the development of technology,the network has overcome the limitat</p><p>  1.0 Introduction</p><

16、p>  1.1 Purpose</p><p>  Computer Network Information Security in national life are more and more attention, because:Many important information stored on the network, once the information leaked would cau

17、se incalculable damage.The reason why the network information might leak out,on the one hand there are many intruders trying so hard to "see"some of the data or information concerned;On the other hand there are

18、 security risks network itself that makes intruders succeed.To solve these problems,this paper summarized and m</p><p>  1.2 Background</p><p>  In recent years, with the development of Internet

19、 technology in the global rapid development, people however, provides a great convenience, information brought in all kinds of material and cultural enjoyment at the same time, we are also subject to increasingly serious

20、 security threats from the network, such as network data theft, hackers, virus release, and even system internal leak. Although we are using a variety of complex software technology widely, such as firewall, proxy server

21、, invasion </p><p>  1.3 Methodology</p><p>  At present, the rapid development of the Internet, the impact on the increase, has become an indispensable part of life. The Internet to bring conve

22、nient services and vast amounts of information at the same time, its own security issues has become increasingly prominent. Some people spread bad information through the network even engage in illegal activities, disrup

23、ting the normal order of society, to the people's work, study and life adversely affected. Effectively solve this problem, you shoul</p><p>  Information in a shared network, while inevitably there are s

24、ecurity risks, network security has become the focus of the current network technology. Therefore, network security evaluation method is to quantify the importance of network security technologies. This paper attempts to

25、 design and develop common specifications for network security evaluation models and methods, design and implementation of this system have universal applicability. For this specific issue of network security assessment&

26、lt;/p><p>  Traditional network security is the use of online anti-virus, firewall, intrusion detection and other network security measures, but these methods is a passive defensive approach, with greater blind

27、ness, lack of consideration of the entire network system, has been unable to meet the current network security needs. In recent years, some new theories and methods of research and development, some scholars SFTA analysi

28、s, FMECA risk analysis, neural networks and other methods used in the field of net</p><p>  In this paper, the network security risk analysis based on the combination of network security comprehensive evalua

29、tion of the actual needs, is established based on AHP comprehensive evaluation model of network security. Compared with other evaluation methods, AHP evaluation of network security to have a greater advantage, a more acc

30、urate evaluation of the results, conclusions more persuasive</p><p>  2.0 Procedure and Findings</p><p>  Although the computer network information security is threatened, however, take appropri

31、ate protective measures can effectively protect the security of network information. This paper summarizes several methods and explained in order to ensure the protection of network information in the security strategy.&

32、lt;/p><p>  2.1 Hide IP address</p><p>  Hackers often use some network detection technology to check our host information, the main purpose is to have the network host IP address. An IP address is

33、 a very important concept in network security, if the attacker knows your IP address, equal to his attack ready target, he can make the IP launch a variety of attacks, such as DoS (denial of service) attack, Floop overfl

34、ow attack. The main method to hide IP address is to use a proxy server. Use a proxy server, other users can only detect the </p><p>  2.2 Sealed hackers"back door"</p><p>  As the sayi

35、ng goes, "there are no waves without wind.", since the hacker can enter, then our system must exist for them to open the "back door", as long as we put the blocked, allow hackers to no place to start.

36、(Appendix 1.0)</p><p><b>  . </b></p><p>  2.2.1 Delete unnecessary protocols. For the server and host, TCP/IP protocol is usually installed enough. Right mouse click "network

37、neighbor", select "properties", then right click on the "local connection", select "properties", uninstall unnecessary protocol. Where NetBIOS is the source of many security flaws, it d

38、oes not need to provide file and print sharing host, you can bind in the TCP/IP protocol NetBIOS to be closed, to avoid attacks on NetBIOS.</p><p>  . 2.2.2 Prohibit the establishment of air link. By def

39、ault, any user can connect with server through the air, enumeration account and password guessing. Therefore we must prohibit the establishment of air connection.</p><p>  2.2.3 Turn off unnecessary services

40、. The service is much more can bring convenience to management, but also to the hacker left an opportunity, so for some really not used to service, better to turn off the. For example, without the need for remote managem

41、ent computer, I will sign off on the remote network service. After removing unnecessary services stop, can not only ensure the security of the system, but also can enhance the system speed.</p><p>  2.3 Do I

42、E's security settings</p><p>  ActiveX controls and Java Applets has strong function, but there are also used hidden malicious code in the webpage, often use small programs written in these controls, jus

43、t open the webpage will be running. So to avoid malicious webpage attack only against these malicious code to run. IE provides several options, concrete steps are: "tools", "Internet options", "s

44、ecurity" and "custom level". In addition, we can only set the Internet, local Intranet, trusted sites, the restricted sites in the IE</p><p>  2.4 Trojans guard</p><p>  The Troja

45、ns will steal useful information embedded in the computer, so we have to prevent hackers implanted Trojan program, commonly used methods(Appendix 2.0):</p><p>  (1) to download the file first into their new

46、folder, and then anti-virus software to detect, played the role of prevention in advance.</p><p>  (2) in the "start" and "program", "start" or "start", "program&

47、quot;, "Startup" option to see whether a project is run, if any, can be deleted.</p><p>  (3)the registry in KEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run under all prefixed with

48、"Run" suspicious programs all can be deleted.</p><p>  3.0Conclusions</p><p>  Although now for many network security products, such as firewall, anti-virus, intrusion detection syste

49、m, but there are still many hackers illegal intrusion. The fundamental reason is that security network itself unable to eradicate, which makes the hacker intrusion advantage. Even so, the safety protection must remain ca

50、utious, as far as possible to reduce the hacker may, in order to protect the security of network information of our.</p><p>  References</p><p>  1. Kevin Mandia,Chris Prosise,Incident Response

51、:Investigating Computer Crime .Mcgraw-Hill Press,2002-10-1</p><p>  2. Anonymous,Maximun Security Third Edition ,SAMS Press,2003-1-1</p><p>  3. Xu Chaohan. Computer network security and data

52、integrity technology [M]. Beijing: Electronic industry Press, 2005</p><p>  4. Andrew S.Tanenbaum. Computer networks fourth edition Beijing Tsinghua University Press</p><p><b>  Appendix&

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論