abstract:
The function of modern computer system is becoming more and more complex, and the network system is becoming more and more powerful, which has a great and far-reaching impact on society. At the same time, however, due to the characteristics of diversified connection forms, uneven distribution of terminals, openness and interconnection of the network, the network is vulnerable to attacks by hackers, malicious software and other irregular behaviors, making security issues more and more prominent. For the military automation command network and C3I system, the security and confidentiality of its online information is particularly important. Therefore, it is necessary to improve the defense ability of computer network and strengthen network security measures, otherwise the network will be useless and even endanger national security. Whether it is a local area network or a wide area network, there are many loopholes and potential threats caused by natural and human factors. Therefore, the network defense measures should be aimed at various threats and vulnerabilities to ensure the confidentiality, integrity and availability of network information.
Keywords: network security, firewall, hacker, transmission protocol, defense
catalogue
abstract
Chapter 1 What is safety?
Chapter II Protocol Layer Security 7
Chapter III Firewall Basis 10.
Chapter IV Network Security Basis .................................................. 12
Chapter V Countermeasure Analysis
Conclusion ..................................... 19
refer to
[1] Zheng lianqing et al. battlefield cyber warfare [M]. Beijing: military science press, 200 1.
[2] Zhang. : , 1998,(4):26-30.
[3] Internet security.
[4] Analysis and prevention of hacker intrusion.
[5] Information warfare and computer network attack and defense. Download the full text at: /docs/28732/!