首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Writing a basic article on network security is something like writing a brief introduction to flying a commercial airliner. Much must be omitted, and an optimistic goal is to enable the reader to appreciate the skills required. The first question to address is what we mean by "network security." Several possible fields of endeavor come to mind within this broad topic, and each is worthy of a lengthy article. To begin, virtually all the security policy issues apply to network as well as general computer security considerations. In fact, viewed from this perspective, network security is a subset of computer security. The art and science of cryptography and its role in providing confidentiality, integrity, and authentication represents another distinct focus even though it's an integral feature of network security policy. The topic also includes design and configuration issues for both network-perimeter and computer system security. The practical networking aspects of security include computer intrusion detection, traffic analysis, and network monitoring. This article focuses on these aspects because they principally entail a networking perspective.  相似文献   

2.
网络安全技术   总被引:2,自引:0,他引:2  
近几年来,Internet技术日趋成熟,已经开始了从以提供和保证网络联通性为主要目标的第一代Internet技术向以提供网络数据信息服务为特征的第二代Internet技术的过渡.作为全球使用范围最大的信息网,Intemet自身协议的开放性极大地方便了各种计算机连网,拓宽了共享资源.本文将介绍网络系统的这五个方面及下一代互联网(Ipv6)技术.  相似文献   

3.
Increasingly, distributed processing is used to achieve the availability and processing power required by today's information technology systems. Networks are an important element in this drive towards more responsive systems. These systems can vary in size from a few desk top machines connected together in a single office to a complex of mainframes, controllers and terminals owned by a variety of organizations worldwide. It is shown that much work has been done to establish the security services that can be provided to users of these networks. If these services are to achieve their desired level of service, however, careful attention must be paid to the way they are planned, implemented and, in particular, the way in which they are managed.  相似文献   

4.
5.
The network is only as secure as its weakest access point. At one extreme we have the totally open network with every user having open access to every area of the network. At the other we have the ultimate secure network with no user connections so that there are no insecure access points! Somewhere in between we have a balance in the security provided to maintain an easy to use and accessible network whilst reducing the risk of breaches to security. Today computing networks span the world with thousands of entry points. Remote access technologies and the Internet or corporate intranets further extend the network to include remote and mobile users. Whilst these technologies heighten the productivity of the organization they also increase the security risks.  相似文献   

6.
本文针对企业网络系统存在的潜在威胁,分析其网络安全脆弱性的主要原因,结合实际讲述了目前常见的安全性威胁类型以及防范威胁安全机制。  相似文献   

7.
信息网络的迅速发展普及应用,在给人们的工作、生活带来巨大便利的同时,也带来了许多安全隐患,出于政治、经济、文化等利益的需要或者好奇心的驱动,网络攻击事件层出不穷、屡见不鲜,且有愈演愈烈之势,轻者给个人或机构带来信息损害、经济利益损失,重者将会影响国家的政治、经济和文化安全.因此,信息网络安全问题已成为国内外研究重点.  相似文献   

8.
近年来,网络攻击事件时有发生,给社会和企业带来巨大威胁和损失,对于网络安全评估方法的研究成为了热点,文中介绍了网络安全评估方法的研究现状,分析了网络安全评估相关技术,进而探析了网络安全评估方法。  相似文献   

9.
10.
网络安全漏洞扫描器   总被引:3,自引:0,他引:3  
网络安全漏洞扫描器是近年来网络安全研究的热点。文章说明了网络安全漏洞扫描的必要性,给出了网络安全漏洞扫描器的概念和结构,概述了多种漏洞扫描的技术,最后介绍了网络安全漏洞扫描器的国内外现状及评判标准。  相似文献   

11.
12.
13.
密码成为现代生活不可缺少的部分,本文介绍了使用密码的常识,提供了忘记密码时的一些补救措施。  相似文献   

14.
思科系统 《信息网络》2003,(5):27-28,30
思科安全解决方案可以分为:安全连接、周边安全、入侵防范、身份辨识、安全管理等几个方面。安全连接通过VPN实现,思科拥有VPN集中器和基于IOS的VPN。周边安全则采用防火墙来保障,思科在这方面的产品有PIX系列防火墙和基于IOS的防火墙。入侵检测或漏洞扫描的方式可以进行入侵防范,这类产品有专门的IDS产品和基于IOS的IDS。思科通过专门的ACS服务控制器(Radius,Tacas+)和基于IOS的功能模块完成身份识别功能。采用专用的安全策略管理和基于WEB的管理器进行安全管理。一、入侵防范入侵检测系统的作用类似于现实生活中的监视摄…  相似文献   

15.
16.
17.
传感技术中网络安全问题是由传感器获取的信息或图象通过计算机网络传输时产生的 ,以保证网上获取信息的安全、可靠。主要论述采用口令、数据加密、防火墙、数字签名、网络安全管理技术。  相似文献   

18.
19.
20.
The process of improving network security begins with documenting the network configuration and its components Network management must know who the system users, are, what they are accessing, when, where, how, and why. Once management has this information, steps can be taken to ensure that only authorized users are accessing the network.To manage a successful telecommunications environment, there must be a balance between cost, security, risk, performance, and connectivity. The controls discussed here, when applied in the proper combination, can help to achieve this balance. A company must already have sound business practices such as adequate separation of duties, management approvals, and a development methodology.The controls contained here focus primarily on data communications and are environment independent. Specific hardware, software products, and services are mentioned as examples and should not be considered an endorsement.This article is based upon a white paper developed and published by the members of Nasig, the Network Access Special Interest Group, organized by the San Francisco Bay Area Chapter of the Information System Security Association (Issa), Inc.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号