Current location - Education and Training Encyclopedia - Graduation thesis - Computer information network security discussion draft?

With the development of the times and the progress of science and technology, the computer network has developed rapidly, and the security

Computer information network security discussion draft?

With the development of the times and the progress of science and technology, the computer network has developed rapidly, and the security

Computer information network security discussion draft?

With the development of the times and the progress of science and technology, the computer network has developed rapidly, and the security problem of the network has become increasingly prominent. With the development and application of computer network informatization, the security and confidentiality of information have been widely concerned. The following is what I recommend to you, I hope you like it!

Article 1 "Computer Information Network Security"

With the rapid development of computer communication technology and computer informatization, data and information resources are expanding rapidly, and the application of computer network makes communication convenient and fast. However, with the rapid development of computer network technology, computer network not only provides convenience for people's work and life, but also poses an increasingly serious threat to network security. This paper will discuss the attack methods of computer network and the security and protection of computer network information, and put forward effective solutions.

Keywords: computer network; Information security; Virus protection; Network intrusion

China Library ClassificationNo.: TP393.08 Document IdentificationNo.: A DocumentNo.:1007-9599 * * 2012 * * 05-0000-02.

I. Overview

With the development of the times and the progress of science and technology, the computer network has developed rapidly, and the security problem of the network has become increasingly prominent. With the development and application of computer network informatization, the security and confidentiality of information have been widely concerned, and computer crime and secret theft have become a major social problem in the world today.

* * * A * * Network Security

Network security refers to the organic combination of management technology and communication application, and its integrity and availability are related to network layout and media transmission. Generally speaking, network security mainly includes the secure application of information stored and transmitted in the network. The requirement of network security is to ensure the privacy, integrity, applicability and authenticity of information on the basis of network communication.

* * * 2 * * * Main factors affecting network security

Main network threats to network security:

1. The universality of the network. The openness, enjoyment and wide application of the network are the main security risks faced by network security. First, the openness of the network makes the attacks faced by the network unpredictable, or comes from the theft of physical transmission and the modification of network communication protocols, as well as the destruction of software and hardware loopholes in network control. The second is the global use of the network. The attack on the network comes not only from local network users, but also from any other illegal users in the network. Third, the freedom of the Internet. There are no technical requirements for users to use the Internet. Users can surf the Internet freely, publish and obtain all kinds of information.

2. Limitations of firewall. Firewall can ensure the security of the network, but it can't completely guarantee the absolute security of the network, so it is difficult to prevent attacks and virus threats from within the network, which is also the limitation of firewall security protection.

3. Network software factors. The use and management of the network need the support of multi-party software and systems, and the storage and forwarding of information are modulated by them. Because of the complexity of software, it is very limited to ensure the security of network software system. Therefore, there are loopholes in the software, which provide convenience for hackers and hide network threats.

Second, computer information network security

Due to the universality of network security, network security management technology has been widely concerned. Among them, the application of network security management technology has also emerged and developed.

* * * A * * Common Network Security Management Technology

Due to the universality of network security issues, security technologies need to be constantly developed and improved, and the wide application of various network security management technologies has also improved the security of computer networks to some extent.

1. firewall technology

Firewall is a combination of software and hardware equipment, and it is an information guarantee technology between internal network and external network, and between private network and public network. It establishes a security gateway to protect the internal network from being modified by illegal users. Using security scanning technology, we can scan the security vulnerabilities of LAN, Web network, operating system, communication service and firewall. Administrators can observe potential threats in the network system, vulnerabilities that may be attacked by buffer overflow or denial of service, and can also detect whether illegal programs are installed in the system and whether there are security loopholes and configuration errors in the firewall. Firewall can ensure the security of the network, but it can't completely guarantee the absolute security of the network, so it is difficult to prevent attacks and virus threats from within the network, which is also the limitation of firewall security protection.

2. Information management technology

With the development of computer technology and the combination of commercial operation, information technology management machine has become familiar to everyone. The brand-new resource sharing and application mode brought by digital resources has brought a new breakthrough in software services. Information technology management in computer information network security should provide users with various modes of interaction and communication, as well as version management, schedule management, distribution and sharing, workflow management and interaction with various digital user terminals. Digital resources are a new breakthrough in modern science and technology, which also brings changes to the construction of modern information technology management information resources and the construction of a balance mechanism between the protection of information network communication rights and the enjoyment of innovative information resources. It can improve the level of information technology, enhance the competitive strength of commercial market, effectively formulate management system and specific measures to improve management level. Analyzing the development strategy of computer information network security management information system can achieve the maximum effect with less investment.

The purpose of network security scanning technology is to let system administrators know the existing security vulnerabilities in time, take security precautions and reduce network security risks. For data warehouse, digital resource technology is a new idea to construct data warehouse system. We should establish a licensing mechanism for information resources to enjoy knowledge, integrate and optimize the existing licensing model, explore the balance between the protection of communication rights and information enjoyment, achieve a win-win situation for knowledge expansion and private property protection, and maximize social benefits. The information resources in network security scanning technology are applied to distributed storage and distributed access technology. When network users need to retrieve the information of network security scanning database, they can use various types of database retrieval systems. The integration of information resources requires the integration of SOA and Web2.0, and SOA provides a building platform. In the network security scanning technology, digital resource technology covers the heterogeneity of network databases and effectively eliminates information islands. To realize multi-party rapid information sharing, users can search for requirements anytime and anywhere, and network security controllers need to integrate data resources into storage servers and formulate access rules.

Third, computer network security strategy

* * * The causes and main forms of network information security.

The purpose of network security scanning technology is to let system administrators know the existing security vulnerabilities in time, take security precautions and reduce network security risks. Separate the monitoring data from the monitoring database for network information, and keep the basic monitoring data and recent network monitoring data necessary for system monitoring to ensure the normal monitoring of the system. At the same time, the historical monitoring data is stripped out and imported into the backup monitoring database, and then the network security monitoring is re-established on the backup monitoring database. Due to the requirement of network information security in the production process, the network information security in the production process needs scientific design. Intrusion detection system, a new technology, is widely used in the production process of network information security strategy, which enables the network to be safely controlled and realize efficient utilization and reliable production.

Intrusion detection technology in * * * network security

In the process of network information transmission, the monitoring system is used to monitor the execution state of the network, discover the attacks from the network in time, give an alarm or make corresponding response mechanism to the network attack behavior or attack result, and ensure the integrity of the network system resources. Firewall can ensure the security of the network, but it can't completely guarantee the absolute security of the network, so it is difficult to prevent attacks and virus threats from within the network, which is also the limitation of firewall security protection.

Fourth, the network information security protection strategy

Although hacker activities have become more and more rampant in recent years, there are more and more attacks, but taking perfect protective measures can still effectively protect the security of network information.

The Application of Intrusion Detection Technology in * * * Network Security

In intrusion detection, with the continuous increase of network data, problems in detection data are constantly exposed. At present, the data transmission end of network security monitoring system has a low execution speed, and the overtime errors of monitoring data query are more frequent than before, and the implementation situation is poor, which affects the processing of front-end intrusion detection network monitoring. An effective security strategy is to separate the monitoring data from the monitoring database used for intrusion detection in normal monitoring, and keep the basic monitoring data and recent network monitoring data necessary for system monitoring to ensure the normal monitoring of the system. At the same time, the historical monitoring data is stripped out and imported into the backup monitoring database, and then the network security monitoring and analysis system is re-established on the backup monitoring database. The data separation strategy of intrusion detection includes network monitoring data table analysis.

* * * 2 * * Establish a computer network information security system

Firewall in computer network is a combination of software and hardware equipment, and it is an information guarantee technology between internal network and external network, and between private network and public network. The basic security policy of information security system construction is "unified planning and construction, comprehensive defense, equal emphasis on technical management and ensuring operational safety", which highlights the importance of overall planning, provides unified technical standards, management norms and implementation steps required for security construction, and also ensures the investment of personnel and funds. Comprehensive defense refers to the comprehensive use of various security mechanisms at the technical level, which organically combines the protection effects of different security mechanisms to form a complete three-dimensional protection system. Paying equal attention to technology management highlights the importance of security management in the information security system. Only relying on the security technology system can not solve all security problems. The cooperation between the safety management system and the technical protection system enhances the efficiency and effect of the technical protection system, and at the same time makes up for the safety defects that cannot be completely solved by the existing technology, and achieves the best protection effect. Ensuring network security highlights the importance of security. Various security mechanisms are adopted to ensure the security of the network and information system, as well as the continuity of network communication and the security of business data. Digital information resources in the network digital resource environment are applied to distributed storage and distributed access technology. When network users need to retrieve database information, they can use various types of database retrieval systems. The integration of information resources requires the integration of SOA and Web2.0, and SOA provides a building platform. In computer network security, information resource technology covers the heterogeneity of network databases and effectively eliminates information islands. To realize rapid information sharing in various ways, users can search information anytime and anywhere, and librarians need to integrate data resources into storage servers in the cloud and formulate access rules.

Verb (abbreviation of verb) conclusion

With the rapid development of computer communication technology and computer informatization, data and information resources are expanding rapidly, and the application of computer network makes communication convenient and fast. However, with the rapid development of computer network technology, computer network not only provides convenience for people's work and life, but also poses an increasingly serious threat to network security. In order to ensure the secure communication of the network, network security issues are highly valued. Although there are many network security products, network security refers to the organic combination of management technology and communication application, and its integrity and availability are related to network layout and media transmission. The requirement of network security is to ensure the privacy, integrity, applicability and authenticity of information on the basis of network communication.

References:

[1] Xu Zhikun, Wei Wang, Guo Tiansen, Yang Jilong. Network penetration technology. Electronic Industry Press, 20 1 1, 5.

[2] Rowling. Network engineering technology. Science press, 200 10/0,7

[3] Concise. Research on computer network information security and its protection strategy [J]. Science and Technology Information, 20 10/0,28

Click next, and more >>& gt?