Current location - Education and Training Encyclopedia - Graduation thesis - Selected Thesis of Computer Network Security
Selected Thesis of Computer Network Security
With the rapid development of computer technology, people pay more and more attention to the security of computer network. The following is my graduation thesis on computer network security for your reference.

Computer Network Security Graduation Thesis Part I: Challenges Faced by Computer Security at the Present Stage

With the progress and development of modern science and technology, modern information technology has gradually been more widely used, bringing convenience and speed to people's lives and work, and computer security directly affects the information security of computer users. This paper analyzes and studies the problems existing in computer security in the new period.

Keywords new period; Computer Security Problems and Solutions: Challenges

Introduction to 0

With the application of computers in various fields, the number of computer users is increasing gradually, and more and more important information is stored by computers, so it is an urgent task to solve and prevent computer security problems. Computers are easily invaded by hackers and viruses, which will not only affect the security of computers, but also affect the information security of users, causing great harm to users. Therefore, the security of computer must be worth pondering and studying.

1 Definition and composition of computer security

Computer security is actually the technical and management security protection of data processing system, which protects computer hardware, software and data from being destroyed, changed and exposed due to accidents or malicious reasons. Computer security is mainly divided into two parts, one is computer network, and the other is computer built-in system. Among them, computer network is the most vulnerable data, so we should focus on the security of computer network. In fact, the built-in computer system refers to ensuring the normal operation of the computer, ensuring the safety of users during use, and the safety of the computer itself. Among them, whether the computer can run safely is closely related to the system installed in the computer; The safety of users is closely related to the electromagnetic waves in the process of use, and it is easy to cause personal safety problems when using computers under strong electromagnetic waves. The security problem of the computer itself refers to the environmental problems around the computer when it is used, and it is necessary to exclude the computer from being damaged by external objective factors. Computer networks are not restricted by regions. No matter where you are, your computer may be attacked and violated by hackers. Because computer networks are internationally connected, computer network security is the responsibility of all computer users. After the discovery in recent years, the frequency of computer being destroyed by hackers is getting higher and higher, so we must pay attention to computer security and avoid computer security problems.

2 computer security problems to be solved

2. 1 computer hardware security issues

At present, the problems to be solved by computers in the new era are mainly divided into four types: one is the chip problem, that is to say, some chips with great security risks are implanted in the core part of the computer. Once these chips are implanted in the computer, they can open instructions to receive virus signals, thus destroying the core content of the computer and achieving the purpose of stealing data. In the worst case, it can paralyze the whole computer. Second, the leakage of electromagnetic waves, because the computer will radiate powerful electromagnetic waves when it is used, is precisely because the computer has this function when it is used, and some lawless elements use this characteristic of the computer to restore powerful electromagnetic waves, thus achieving the purpose of stealing information and data. The third is hardware damage, which is typically manifested as hardware damage and memory failure, or the data backup function of the computer itself can not be used normally, resulting in the inability to use and store data. Although the computer itself has the reinforcement technology, the reinforcement technology still has certain limitations and cannot better protect the computer hardware.

2.2 Computer Network and Software Problems

With the popularization and popularization of computer networks, more and more people use computer networks, but there are also many problems in computer networks and software. Typical manifestations are: information is modified, identity is fraudulently used, information is stolen and destroyed, and so on. Its main manifestations are as follows: First, there are viruses in the computer, and some software comes with some viruses, which can steal users' data and delete important data from users' computers. Second, Trojan or backdoor Trojan virus, these seemingly legitimate programs actually cover up the facts with the surface, thus secretly stealing user data through informal means; Third, being eavesdropped means that users are obtained by criminals when transmitting information; Fourth, data and information are tampered with, and after the data stored by users are transmitted, criminals tamper with these data; Fifth, camouflage, some lawless elements wear the cloak of legitimate users and enter the program to steal information; Sixthly, interception service means that users are intercepted by criminals when transmitting data and information to each other, and then the information is intercepted, which will cause the loss of information and the termination of the system. It can be seen that the threats to computer network security are varied, and these ways of affecting security are becoming more and more hidden, which requires us to pay attention to computer security issues and find some solutions to these security issues.

3 Strategies to solve computer security problems

3. 1 Master computer maintenance knowledge

In order to effectively protect computer security, computer users should have some basic knowledge of protecting computer security and be civilized computer users. In order to avoid computer security problems caused by improper operation of users and make computers play a greater role and serve people, we need to do the following: First, pay attention to the temperature of the computer when it is used, which is 10℃ to 35℃ under normal circumstances. Pay attention when using the computer in summer. Second, when not using the computer, turn off the power supply of the computer and unplug the power cord, so as to avoid burning the computer easily due to excessive current; Third, you can't use the computer in a strong electromagnetic wave environment for a long time to protect the computer security.

3.2 Implantation authentication technology

The purpose of implanting authentication technology in a computer is to verify the identity of the user who sends information and the identity of the user who receives information. This technology is mainly divided into digital signature and digital certificate to avoid data tampering in information transmission. Therefore, this technology is implanted in the computer to improve the security of information transmission. Digital signature means that the identity can be confirmed when the hash values of the sender and the receiver are consistent. The other means that the sender and receiver of information must pass the password provided by the authoritative certificate before they can enter the system to extract information.

3.3 Be good at using firewalls

Firewall is a protective wall between computer and network. Whether a computer sends or receives information, it must pass through a firewall. The firewall can scan the information, exclude some information with viruses, and prevent some information from spreading on the computer, thus destroying other software and hardware on the computer, thus protecting the computer network security to a great extent. Therefore, users who use computers must install firewalls to protect computer security.

3.4 to protect computer hardware security

Protect computer hardware security to ensure the normal operation of the computer. At present, the computer hardware market is chaotic, which requires consumers who choose computer hardware to choose hardware with high cost performance. They really don't know how to choose. They can consult some computer professionals to ensure the quality of computer hardware and improve the safety performance of computers.

4 conclusion

To sum up, the existence of computer security problems threatens the information of computer users, which will seriously cause irreparable losses. Therefore, we should attach importance to computer security protection, which requires various support and efforts to ensure computer security.

Computer Network Security Graduation Thesis Part II: Encryption Technology and Computer Security Technology Management

Since the information technology revolution, information technology with computer technology, internet technology and multimedia technology as the core has developed rapidly. Computers have penetrated into people's daily life and production practice. It can be said that the Internet has become a necessity of society, so people's requirements for computer information security are getting higher and higher. There are many softwares and computer technologies to ensure computer information security and prevent information leakage, but most users know little about computer knowledge. Therefore, computer encryption technology has become the easiest technology to popularize, and the effect is also obvious. This paper will focus on the application of computer encryption technology in computer security.

Computer security; Encryption technology; App application

With the continuous development of information revolution and the popularization of computer internet, it has provided people with a lot of convenience and increased the danger of personal information being stolen. Personal privacy needs to be protected urgently. The security of personal information is closely related to us, such as the theft of game accounts, the theft of QQ accounts and the leakage of computer files. Data encryption is the most important computer security technology. This paper will discuss the computer encryption technology, in order to better promote the popularization of encryption technology, provide relevant opinions for computer users and ensure the safety of personal information.

1 computer encryption technology

1. 1 the concept of computer encryption technology

Computer encryption technology is to formulate a certain computer program language for the original public documents, data or information, so as to turn it into a piece of code that is unreadable under normal circumstances. Computer users can only calculate the algorithm correctly by inputting the correct code. At present, there are some popular encryption software to manage computer information. Software encryption is an encryption method using cryptography. By setting information such as software exchange instruction code and data, illegal users can prevent unauthorized users from illegally stealing, illegally copying, illegally using, rewriting and deleting software without tracking the executed programs. Applying cryptography to information network can ensure that users will not be stolen or rewritten in the process of network data transmission and prevent electronic deception. Ensure the security of computer system and network system. Ensure the consistency, authenticity, integrity and confidentiality of user data information.

1.2 the necessity of computer encryption

The Internet is an open world and a virtual world. It is difficult to supervise, and it is easy to produce many violations of laws and regulations, making the online world unsafe. How to ensure the security of data information in an open network system has become a problem that participants in network information dissemination must face and solve. With the continuous development and popularization of computer technology, more and more people have increased their understanding of computer knowledge. Some people can master the technology of cracking computer passwords by self-study, or make virus programs to destroy computers. Like 2007? Pandas burn incense? Viruses spread through the Internet, which quickly caused a large number of computer users' computers to malfunction, lost computer data and information, and caused great economic losses. In the face of the current network situation, it is understandable to choose data encryption to ensure the security of transmitted files. If computer users want to enjoy the convenience brought by the Internet and ensure the security of data information, only through data encryption technology can they meet the requirements more effectively.

2 Application of encryption technology

2. 1 hardware encryption

Hardware encryption mainly ensures the security of data transmission through the setting of computer hardware. Improve computer security by strengthening the configuration of computer firewall. The setting of computer firewall is relatively simple and convenient, and both LAN and Internet can play a great role. At present, more data exchange is carried out through U disk or USB and parallel port. In order to ensure that these data will not be lost from USB and parallel port, it is necessary to encrypt these data communication interfaces. Only data that meets the key can read data through these data interfaces. Filtering data by key can not only prevent the data information of some computers from being stolen, but also prevent the threat of foreign data to computers.

2.2 CD encryption

CD encryption is mainly to prevent piracy. In the past, a lot of data and information were burned by CD burning software. If the CD data is encrypted by encryption technology, the CD data information can only be read by the key. And when reading the CD, you can only view and browse the CD in the special software interface, but you can't copy the CD, which effectively prevents the data information of the CD from being copied. However, with the continuous progress of science and technology, data storage devices are constantly updated. Because of the shortcomings of small capacity and inconvenient carrying, people use less and less, and the encryption technology of optical discs is also used less and less.

2.3 compression package encryption

At present, the most widely used compression tools are ZIP and RAR, which are the most commonly used data encryption work. Both encryption tools have their own password setting function, and computer users can read the data in the compressed package only by setting the password when decrypting the compressed package. This is similar to encryption in the process of mail transmission. This encryption technology is simpler and easier to understand, so it is more widely used. Encrypting these compressed packages can also reduce the space occupied by compressed files and improve the utilization of computer space. On the other hand, computer users do not need to set multiple keys when setting keys, but can manage them through the KDC platform of the key distribution center. In this platform, data transmission between users will be encrypted by KDC to generate tags and random session passwords, and such keys are only known to each other.

3 Conclusion

Computer encryption technology is relatively simple and easy to use, which can meet the needs of the general public, but it is still too simple for some advanced virus software. Encryption technology can only be combined with information security technology, access control technology and network monitoring technology to improve the ability of encryption technology, and at the same time, it is necessary to strengthen the supervision of the Internet and crack down on cyber crimes.

refer to

[1] Fan Qiusheng. Application of data encryption technology in computer security [J]. Coal Technology, 20 13.

[2] Liu Yunzhi. Analysis of computer network security technology and its existing problems [J]. Information System Engineering, 20 12.

[3] Li Dianxun. Analysis on the application of data encryption technology in computer network security [J]. China Science and Technology Expo, 20 12.

Computer Network Security Graduation Thesis Part III: Computer Network Information Security

Abstract: Living in today's network information age, the security of network information has attracted much attention. People are increasingly worried about whether the stored information will be destroyed or stolen by others, whether there will be faults in the process of information processing, whether the sent information is complete and whether it will be delivered to the other party accurately. Information and network security are not only directly related to the reliability, availability and confidentiality of data in the whole communication process, but also the problems involving user service are very common. Computer network information security is facing unprecedented challenges. All sectors of society should attach great importance to computer network information security, take effective preventive and emergency measures to ensure information and network security and ensure the safe and smooth operation of computer networks.

Keywords: computer network information security hacker intrusion

1 the concept of network information security

1. 1 information security

Measures to prevent any unauthorized access to data, or intentional or unintentional disclosure, destruction and loss of information, so that data is in a state or feature far from danger and threat.

1.2 network security

Information security in computer network environment.

2 Three elements of network information security

(1) Integrity: The characteristic that information is not destroyed by accidental or intentional deletion, modification, forgery, disruption, replay and insertion. Information will not be modified or destroyed during storage or transmission, and there will be no loss or disorder of packets.

(2) Confidentiality: Controlling the development scope of information resources is the most important feature, such as data encryption, access control, and computer anti-electromagnetic leakage.

(3) Availability: Authorized entities can access resources and services when needed. Availability means that the information system must be available at any time when users need it, which means that the information system cannot refuse service. With the development of the information age, the concept and connotation of computer network information security are constantly developing. Because of the different starting point and emphasis, the conclusions are not the same. In addition, for specific security applications, these concepts about information security may not fully cover all situations.

Three factors that undermine network security

3. 1 Human factors and natural disaster factors

(1) Human factors refer to human invasion and attack, which destroy the normal operation of the network system. Some hackers? Take advantage of the convenient conditions that computer viruses can spread in the network, destroy the computer system of units or individuals, steal confidential information and account passwords, and engage in various illegal and criminal activities.

(2) Natural disaster factors mainly refer to fire, flood, storm, lightning, earthquake and other damages, as well as environmental impacts (temperature, humidity, vibration, impact and pollution). This kind of unsafe factors are sudden, natural and non-targeted. This insecurity is the biggest threat to the integrity and availability of network information, but it has little effect on the confidentiality of network information, because generally speaking, physical damage will destroy the network information itself. The effective way to solve this kind of unsafe hidden danger is to take various protective measures, formulate safety regulations and back up data at any time.

(3) The unsafe factors that lead to hidden dangers in the network system are: loopholes in the network operating system, loopholes in the database management system, sharing of network resources, computer viruses, etc.

3.2 Network operating system vulnerabilities

Network operating system is the most basic software of computer network. Transfer files, load and install programs, including executable files, on the network; It can create processes, and even remotely create and activate processes on nodes in the network; There are some daemons in the operating system, actually some system processes, always waiting for some conditions to appear; Operating system provides remote procedure call (RPC) service, but the security verification function provided is very limited. Operating system provides network file system (NFS) service, which is a network file system based on RPC. The daemon software in UNIX and WindowsNT is actually some system processes, always waiting for some conditions to appear. If the requirements are met, the program will continue to run. This kind of software is just taken away and used by hackers. What is even more worrying is that the daemon software has the same permissions as the operating system core layer software.

3.3 database management system security vulnerabilities

Because the database management system (DBMS) is based on the concept of hierarchical management, the security of DBMS can be seen. In addition, there are many interfaces between DBMS and network operating system, and its security must match the security of operating system, which is bound to be a congenital deficiency, and it is inevitable to rely on acquired prevention. Because DBMS runs on the operating system, this security weakness cannot be overcome.

3.4 Enjoy network resources * * *

The biggest advantage of computer network system is that it realizes the sharing of network system resources, hardware, software, data and other resources. This kind of enjoyment is a double-edged sword with two sides. On the one hand, it brings convenience to users, on the other hand, it also creates convenient conditions for illegal users to steal and destroy information. Illegal users or hackers can carry out illegal means or illegal infringement through terminals or nodes.

3.5 Computer Network Virus

Due to the wide application of computer network in contemporary social work and life, the attacks of computer viruses on computers and networks are increasing, and their destructiveness is becoming more and more serious. Once the virus breaks out, it will affect memory, performance, modify data or delete files. Some viruses can even erase the hard disk or make it inaccessible, and even destroy the hardware facilities of the computer. The biggest harm of virus is to paralyze the whole network and make network resources inaccessible. It can be seen that the threat of computer virus to computers and computer networks is very serious and cannot be ignored.

4 solutions

4. 1 firewall technology

Firewall is a special network interconnection equipment, which is used to strengthen the access control between networks, prevent external users from illegally entering the internal network through the external network, access the internal network resources and protect the internal network environment.

The control function of firewall is mainly to control the access of trusted or untrusted addresses. In the use of various network security technologies, the firewall has the highest utilization rate, accounting for 76 .5%. Firewall is relatively cheap, easy to install and can be upgraded online, so it is used in a high proportion. Firewall can monitor the communication data in and out of the network, so as to allow only safe and approved information to enter, and at the same time resist the data that pose a threat to the enterprise.

4.2 Encryption technology of network information data

The emergence of encryption technology provides a guarantee for global e-commerce and ensures the smooth and safe conduct of online electronic transactions. It can be seen that perfect symmetric encryption and asymmetric encryption technology is still the main task of 2 1 century. Symmetric encryption is a traditional password-based technology, and the encryption operation and decryption operation use the same key. Asymmetric encryption means that the encryption key is different from the decryption key. The encryption key is public and can be used by anyone, while the decryption key is only known by the decryptor.

In the modern society with the rapid development of information technology, network security has always been a comprehensive topic. Maintaining network information security requires not only advanced science and technology, but also the support and cooperation from all walks of life to jointly create and maintain a good network environment. At the same time, we should speed up the research and innovation of network information security technology, so that network information resources can serve the vast number of users more safely and reliably.

Guess you like:

1. Appreciation of computer network security technical papers

2. Computer network security papers.

3. Selected papers on computer network system security demonstration

4. Computer network security related papers

5. Computer Network Information Security Papers