首页 | 本学科首页   官方微博 | 高级检索  
     

计算机网络黑客及网络攻防技术探析
引用本文:江雨燕.计算机网络黑客及网络攻防技术探析[J].计算机应用与软件,2003,20(3):56-58.
作者姓名:江雨燕
作者单位:安徽工业大学计算机学院,马鞍山,243032
摘    要:本文首先介绍了网络黑客概念,然后介绍现有的各种网络攻击方法和防护方法,包括各种典型的攻击模式(如监听,密码破解,漏洞,扫描、恶意程序码,阻断服务和Social Engineering)和各种典型的防护模式(如数据加密,身份认证,存取控制,审计,监控和扫描)。

关 键 词:计算机网络  黑客  网络攻防技术  因特多  网络安全  信息安全

ON THE TECHNIQUES OF HACKERS ATTACKING AND DEFENDING COMPUTER NETWORK
Jiang Yuyan.ON THE TECHNIQUES OF HACKERS ATTACKING AND DEFENDING COMPUTER NETWORK[J].Computer Applications and Software,2003,20(3):56-58.
Authors:Jiang Yuyan
Abstract:After introducing the defintion of "Hackers", this paper discusses the existing methods of both cyber attacking and cyber defending.The former includes some typical attacking modes(monitoring,password - decoding,loophole,scanning, vicious programming,service - blocking and Social Engineering) while the latter some typical modes of cyber defending(data- encrypting, identity - validating, deposit-control, auditing, monitoring and controlling, and scanning) .
Keywords:Internet Cyber safety Attacking Defending  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号