Abstract: The problem of network security has become a challenge and threat in the information age, and the problem of network security has become increasingly prominent. The specific manifestations are: (1) The network system is seriously infected and destroyed by viruses; Hackers have become an important threat; Information infrastructure is facing the challenge of network security. This paper analyzes the main factors that affect the ability of network security, and puts forward some suggestions on how to improve network security: to establish a fully functional and globally coordinated security technology platform, which supports and cooperates with the information security management system.
Keywords: network security; Analysis of current situation; Preventive strategy
introduce
With the rapid development of computer network technology, especially the wider application of the Internet, it has brought unprecedented information. At the same time, the openness and freedom of the network also create the possibility that private information and data will be destroyed or infringed. The security of network information has become more and more important, and has been paid attention to by all fields of the information society. Today, we analyze the security risks of computer networks and discuss the corresponding preventive strategies.
At present, all aspects of life are increasingly dependent on computer networks, and the degree of social dependence on computers has reached an unprecedented record. Because of the fragility of computer network, this high dependence makes the country's economy and national defense security very fragile. Once the computer network is attacked, it can't work normally or even be paralyzed, and the whole society will fall into crisis.
1 Computer network security status and analysis.
2 computer network security prevention strategy.
2. 1 firewall technology.
2.2 Data encryption and user authorization access control technology. Compared with firewall, data encryption and user authorization access control technology are more flexible and more suitable for open networks. User authorization access control is mainly used to protect static information, which requires system-level support and is generally implemented in the operating system. Data encryption is mainly used to protect dynamic information. Attacks on dynamic data can be divided into active attacks and passive attacks. For active attacks, although inevitable, they can be effectively detected. For passive attacks, although not detected, they can be avoided. The foundation of all this is data encryption. Data encryption is essentially a transformation algorithm based on symbols to shift and replace data, and this transformation is controlled by "key". In the traditional encryption algorithm, the encryption key and decryption key are the same, or one can infer the other, which is called "symmetric key algorithm". Such keys must be kept secret and only known by authorized users. Authorized users can use this key to encrypt messages or decrypt information. DES is the most representative algorithm among symmetric encryption algorithms. If there are irrelevant keys in the encryption/decryption process to form an encryption/decryption key pair, the encryption algorithm is called asymmetric encryption algorithm or public key encryption algorithm, and the corresponding encryption/decryption keys are called public key and private key respectively. In the public key encryption algorithm, the public key is public, and anyone can encrypt information with the public key and then send the ciphertext to the owner of the private key. The private key is secret and used to decrypt the information encrypted by the received public key. At present, RSA and other typical public key encryption algorithms are widely used.
2.3 Intrusion detection technology. Intrusion detection system (IDS) is a kind of network security system, which collects information from various computer systems and network systems, and then analyzes the characteristics of intrusion through these information. IDS is considered as the second security gate behind the firewall. It can detect intrusion attacks before they do harm to the system, and use alarm and protection systems to drive them out. In the process of intrusion attack, the loss caused by intrusion attack can be reduced; After being attacked by an invasion, the relevant information of the invasion attack is collected as the knowledge of the defense system, which is added to the strategy set to enhance the defense ability of the system and avoid the system from being invaded by the same type again. The functions of intrusion detection include deterrence, detection, response, loss assessment, attack prediction and prosecution support. Intrusion detection technology is a technology designed and configured to ensure the security of computer system, which can find and report unauthorized or abnormal phenomena in the system in time, and is also a technology used to detect violations of security policies in computer networks. The role of intrusion detection technology is mainly reflected in the following aspects: monitoring and analyzing the activities of users and systems, and discovering unauthorized operations of illegal users and legal users. Detect the correctness of system configuration and security vulnerabilities, and prompt the administrator to fix the vulnerabilities; Identify activity patterns that reflect known attacks and alert relevant personnel; Statistical analysis of abnormal behavior patterns; Can respond to the detected intrusion behavior in real time; Evaluate the integrity of important systems and data files; New attack patterns can be found.
2.4 Anti-virus technology.
2.5 Safety management team building.
3 Conclusion
With the rapid development of the Internet, network security has gradually become a potentially huge problem. People pay more and more attention to the security of computer network. Generally speaking, network security is not only a technical problem, but also a security management problem. It is necessary to comprehensively consider safety factors and formulate reasonable objectives, technical schemes and relevant supporting laws and regulations. There is no absolutely safe network system in the world With the further development of computer network technology, network security protection technology will inevitably develop with the development of network applications.
refer to
[1] Network analysis report of the National Computer Network Emergency Center in the first half of 2007.
[2] Wang Da. Network administrators must read-Network Security Second Edition.