Current location - Education and Training Encyclopedia - Graduation thesis - What is a good topic for writing a paper on computer network security? ...
What is a good topic for writing a paper on computer network security? ...
1, Reflections on Network Security and Network Ethics (20) 2007-5-210: 28: 00

/content/2007-5-265438

Internet security is a problem that people pay close attention to. It is known that the love bug virus of 200 1 and the Code red worm of 2002 infected hundreds of thousands of hosts in a few hours, each time causing a loss of about $65,438 billion. According to a survey report, as of June, 2002, 5438+ 10, 88% of websites admitted that 90% of them had installed firewall, intrusion detection and other security devices. However, in the last year, 88% were infected by viruses. The research on the Internet shows that the Internet is free.

2. Computer Network Security (1128) 2006-5-2113: 00.

/content/2006-5-265438

Discussion on computer network security? Peng Jie? (Guangdong Judicial Police School Guangzhou 5 10430)? This paper analyzes the current network security problems, expounds the role of information security technology in ensuring information security, and puts forward a five-layer architecture for building computer network information security. ? Keywords network security firewall encryption security architecture

3. Design of network security solutions for electric power enterprises (83) 2006-5-1122: 02: 00

2006-5- 1 1/6969 1 . html

Luo Tao (Sichuan Electric Power Company, Chengdu, Sichuan, 6 1002 1): Through in-depth analysis of the power information network from three aspects: security protection system, security policy system and security management system, the corresponding power information network security solution is formed. Keywords: electric power information network; Safety protection; Security policy; The rapid development of safety management information network technology and the continuous investment of power information system have brought cost reduction to power enterprises.

4, network security e-commerce IC card system model (378) 2006-4- 18 20:29:00

2006-4- 18/69 192 . html

Yang Guandong, Chen Tianding (School of Information and Electronic Engineering, Hangzhou University of Commerce, Hangzhou, Zhejiang 3 10035): With the rapid development of e-commerce, it has become an urgent problem to establish a secure e-commerce transaction environment. Based on the intelligent IC card, this paper adopts the principle of cryptography, and uses public key cryptosystem and private key cryptosystem to realize the security functions of network trading system, such as non-repudiation, authentication, integrity and confidentiality. & niobium

5. Research on the security model of expressway toll network.

2006-4- 18/69 134 . html

Study on the second stage of modern electronic technology security mode of expressway network toll collection in 2006 Li Jinwei Keywords: expressway; Networking toll network; Security model; Prevention system (the following article is in the form of pictures. If you can't see clearly, you can click the right-click property to download and enlarge. )

Campus Network Security (129) 2006-4-17 9: 36: 00

/content/2006-4- 17/690 16

Abstract: People pay more and more attention to network security. Based on the author's network management experience, this paper discusses his own views and practices on campus network security from the aspects of password security, system security, directory security and Trojan horse prevention, for your reference. [Keywords:] Network security hackers With the in-depth development of the "school-to-school communication" project, many schools have established campus networks and put them into use, which undoubtedly played an inestimable role in speeding up information processing, improving work efficiency, reducing labor intensity and realizing resource sharing. But actively develop office automation and realize resource sharing.

7. Technical Analysis of Network Security (II) (153) 2006-4-23:19: 00

2006-4- 16/6900 1 . html

The principle of firewall deployment is discussed, and the selection criteria of firewall are expounded in detail from the location of firewall deployment. This paper analyzes the classification of information exchange encryption technology and RSA algorithm, and probes into the composition of its security system in view of PKI technology, the core technology of information security. Keywords: network security firewall PKI technology 1. As the first security barrier between intranet and extranet, network firewall technology is the first network security technology that people pay attention to. According to the mainstream trend of its products, most proxy servers (also called application gateways) also integrate packet filtering.

8, network security technology analysis (1) (184) 2006-4-23:16: 00.

/content/2006-4-65438

Starting from the fundamental change of the connotation of information network security, this paper expounds the importance of developing China's national information security system and the necessity of establishing a network security system with China characteristics. This paper discusses the classification and main technical characteristics of network firewall security technology. Keywords: technical features of network security firewall 1 Overview 2 1 century, computers all over the world will be connected through the internet, and the connotation of information security will be fundamentally changed. Not only has it changed from a general defense to a very common defense, but it has also changed from a specialized field to ubiquitous. When humans step,

9. The lag and prospect of network security legislation —— From the "Ruke" incident (9) 22: 54: 00 on March 6, 2005.

Content /2005-3-6/46705.html

Shen, known as the "network genius" of Bashu, was released after being detained for 46 days because he planted a logic bomb in the AWE network program of Yubei Network Information Engineering Company and took away the original program code without authorization. This is because the provisions of Articles 286 and 276 of China's Criminal Law and the provisions of China's Computer Security Protection Regulations (hereinafter referred to as the Regulations) cannot be applied to this specific behavior of Luc, that is, according to the current laws, Luc's behavior does not constitute a criminal offence; According to the current law, Luco's "sabotage" has not yet reached the consequences of punishment. Although the logic bomb it placed can lead to the north.

10, Legal Protection of Information Network Security (16) 2005-10-3123: 0100.

2005- 10-3 1/ 19240 . html

Law is the institutional guarantee of information network security. Without the mandatory normative system of law, the information network security technology and the behavior of operators will lose their constraints. Even with the perfect technology and management means, it is unreliable. A network system without security flaws. Even a fairly perfect security mechanism cannot completely avoid illegal attacks and cyber crimes. Information network security law. Tell people what network behavior can't be done, if they do illegal behavior, they will bear legal responsibility, and those who constitute a crime will also bear criminal responsibility. On the one hand. this is a

/There are many papers on this website. You can synthesize them.