关键词不能为空

当前您在: 主页 > 英语 >

青松陈毅浅析计算机网络安全(英文 含中文翻译)

作者:高考题库网
来源:https://www.bjmy2z.cn/gaokao
2021-01-18 10:22
tags:精品文档, 计算机, 网络安全

-

2021年1月18日发(作者:带一片风景走)
X X X X 学 院
计算机专业英语














班级 计科

学号 12

姓名

日期 2015-12-






Security of Computer Network System
Security of Computer Network System
Abstract: This paper discussed the secure and dependable problem about the
computer network system. On some aspects: the importance of network security
basic theory function and the method of solving a problem etc. Good views for
solving the problem are put forward. It strengthens people’s consciousness on
network security.
Key words: Computer network Virtual private network Encryption techniques
Firewall
Introduction: Along with the computer network technology development the
network security and the reliability have become the question of common interest
by all users. The people all hoped their own network system can move reliably not
external intruder disturbance and destruction .Therefore solves the network
security and the reliable problem carefully is a guarantee the network normal
operation’s premise and safeguard.
First: the importance of the network security. With the information developing
fast today the computer network obtained the widespread application but along
with the network information transmission capacity growing faster some
organizations and departments benefit the speed up with the service operation in
the network while the data has also suffered to extent attack and destruction. The
aggressor may intercept the information in the network steals the user’s password
the database information also may tamper with the database content the forge users
status denies own signature. And what is more the aggressor may delete the
database content the destroy node releases computer virus and so on. This cause
data security and own benefit have received the serious threat. According to
American FBI US Federal Bureau of Investigation invest the network security
creates the economic loss surpasses 17 billion dollars every year.75 corporation
report finance loss is because the computer system security problem creates. More
than 50 safe threat come from inside. But only 59 loss could be possible estimate.
In China the economic loss amount in view of financial domain and the bank
1


Security of Computer Network System
negotiable securities computer system security problems creates has reached as
high as several hundred million Yuan also sometimes occurs in view of other
profession network security threat. Thus it can be seen regardless of is the mean
attack or unconscious disoperation will all be able to bring the inestimable loss to
the system. Therefore the computer network must have the enough strong security
measure. Regardless of is in the local area network or in WAN the network
security measure should be Omni-directional in view of each kind of different
threat and the vulnerability so that it can guarantee the network information’s
secrecy the integrity and the usability.
Second: Network security rationale. International Standardization Organization
ISO once suggested the computer security the definition was: “The computer
system must protect its hardware the data not accidentally or reveals intentionally
the change and the destruction.” In order to help the computer user discrimination
and the solution computer network security problem the American Department of
Defense announced “the orange peel book” orange book official name is
“credible computer system standard appraisal criterion” has carried on the
stipulation to the multiuser computer system security rank division. The orange
peel book from low to high divides into the computer security four kinds of seven
levels: D1 C1 C2 B1 B2 B3 allD1 level does not have the lowest safety
margin rank C1 and the C2 level has the lowest safety margin rank B1 and the B2
level has the medium safekeeping of security ability rank B3 and A1 belongs to
the highest security rating. In the network concrete design process it should act
according to each technology standard the equipment type the performance
requirement as well as the funds which in the network overall plan proposed and
so on the overall evaluation determines one quite reasonably the performance high
network security rank thus realization network security and reliability.
Third: The network security should have function. In order to adapt the
information technology development well the computer network application
system must have following function: 1 Access control: Through to the specific
2


Security of Computer Network System
webpage the service establishment access control system in arrives the
overwhelming majority attack impediment in front of the attack goal. 2 Inspects
the security loophole: Through to security loophole cyclical inspection even if
attacks may get the attack goal also may cause the overwhelming majority attack
to be invalid. 3 Attack monitoring: Through to specific webpage service
establishment attack monitoring system but real-time examines the overwhelming
majority attack and adopts the response the motion for example separation
network connection recording attack process pursuit attack source and so on. 4
Encryption Communication: Encrypts on own initiative the communication may
enable the aggressor to understand the revision sensitive information. 5
Authentication: The good authentication system may prevent the aggressor
pretends the validated user. 6 Backup and restoration: The good backup and
restores the mechanism may causes the losses when the attack as soon as possible
restores the data and the system service. 7 Multi-layered Defense: The aggressor
after breaks through the first defense line delays or blocks it to reach the attack
goal. 8 Sets up the safe monitoring center: Provides the security system
management the monitoring the protection and the emergency case service for the
information system.
Fourth: The network system safety comprehensive solution measures. If want to
realize the network security function we should carry on the Omni-directional
guarding to the network system and thus formulate the quite reasonable network
security architecture. Below on the network system security problem proposes
some guard measure. Physics safe may divide into two aspects: One is the
artificial harm to the network the other is the network to the users. Most common
thing is the constructor who did not understand to the buried cable clearly thus
lead to the destruction of electric cable this kind of situation may through standing
symbolized the sign guards against Has not used the structure wiring the network
to be able to appear the user frequently to the electric cable damage this needs to
use the structure wiring to install the network as far as possible Artificial or natural
3


Security of Computer Network System
disaster influence when to consider the plan. The access control security the access
control distinguishes and confirms the user limits the user in the already activity
and the resources scope which is authorized. The network access control safe may
consider from following several aspects. 1 password: The network security system
most outer layer defense line is network users registering in the registration
process the system would inspect the user to register the name and the password
validity only then the legitimate user can enter the system. 2 The network
resources’ host the attribute and the visit jurisdiction: The network resources
mainly include the resources which shared files the shared printer network users
and so on that all the network users can use. The resources were the host to
manifest the different user to the resources subordinate relations such as builder
modifier and group member and so on. The resources attribute expressed itself
deposit and withdrawal characteristics as can read by who write or the execution
and so on. The visit jurisdiction mainly manifests in the user to the network
resources available degree in using assigns the network resources to be the host the
attribute and the visit jurisdiction may effectively in the application cascade
control network system security. 3 Network security surveillance: The network
surveillance is generally called for “the network management” its function
mainly is carries on the dynamic surveillance to the entire network movement and
handles each kind of event promptly. May understand simply through the network
surveillance discovers and solves in the network security problem such as the
localization network fault point seizes the IP embezzler the control network visit
scope and so on. 4 Audit and track: Network audit and track which is including the
network aspect resources use network breakdown and system keeping. It
composed generally by two parts: One the recording event soon each kind of event
entirely records in the document. Two carries on the analysis and the statistics to.
Data transmission security, transmission security requirements to protect the
information on the network is transmitted to prevent the passive and active
violations. The security of data transmission can take the following measures: (1)
4

-


-


-


-


-


-


-


-



本文更新与2021-01-18 10:22,由作者提供,不代表本网站立场,转载请注明出处:https://www.bjmy2z.cn/gaokao/527247.html

浅析计算机网络安全(英文 含中文翻译)的相关文章

  • 爱心与尊严的高中作文题库

    1.关于爱心和尊严的作文八百字 我们不必怀疑富翁的捐助,毕竟普施爱心,善莫大焉,它是一 种美;我们也不必指责苛求受捐者的冷漠的拒绝,因为人总是有尊 严的,这也是一种美。

    小学作文
  • 爱心与尊严高中作文题库

    1.关于爱心和尊严的作文八百字 我们不必怀疑富翁的捐助,毕竟普施爱心,善莫大焉,它是一 种美;我们也不必指责苛求受捐者的冷漠的拒绝,因为人总是有尊 严的,这也是一种美。

    小学作文
  • 爱心与尊重的作文题库

    1.作文关爱与尊重议论文 如果说没有爱就没有教育的话,那么离开了尊重同样也谈不上教育。 因为每一位孩子都渴望得到他人的尊重,尤其是教师的尊重。可是在现实生活中,不时会有

    小学作文
  • 爱心责任100字作文题库

    1.有关爱心,坚持,责任的作文题库各三个 一则150字左右 (要事例) “胜不骄,败不馁”这句话我常听外婆说起。 这句名言的意思是说胜利了抄不骄傲,失败了不气馁。我真正体会到它

    小学作文
  • 爱心责任心的作文题库

    1.有关爱心,坚持,责任的作文题库各三个 一则150字左右 (要事例) “胜不骄,败不馁”这句话我常听外婆说起。 这句名言的意思是说胜利了抄不骄傲,失败了不气馁。我真正体会到它

    小学作文
  • 爱心责任作文题库

    1.有关爱心,坚持,责任的作文题库各三个 一则150字左右 (要事例) “胜不骄,败不馁”这句话我常听外婆说起。 这句名言的意思是说胜利了抄不骄傲,失败了不气馁。我真正体会到它

    小学作文