共查询到20条相似文献,搜索用时 0 毫秒
1.
Writing a basic article on network security is something like writing a brief introduction to flying a commercial airliner. Much must be omitted, and an optimistic goal is to enable the reader to appreciate the skills required. The first question to address is what we mean by "network security." Several possible fields of endeavor come to mind within this broad topic, and each is worthy of a lengthy article. To begin, virtually all the security policy issues apply to network as well as general computer security considerations. In fact, viewed from this perspective, network security is a subset of computer security. The art and science of cryptography and its role in providing confidentiality, integrity, and authentication represents another distinct focus even though it's an integral feature of network security policy. The topic also includes design and configuration issues for both network-perimeter and computer system security. The practical networking aspects of security include computer intrusion detection, traffic analysis, and network monitoring. This article focuses on these aspects because they principally entail a networking perspective. 相似文献
2.
3.
Paul Halliden 《Computer Communications》1990,13(10):626-629
Increasingly, distributed processing is used to achieve the availability and processing power required by today's information technology systems. Networks are an important element in this drive towards more responsive systems. These systems can vary in size from a few desk top machines connected together in a single office to a complex of mainframes, controllers and terminals owned by a variety of organizations worldwide. It is shown that much work has been done to establish the security services that can be provided to users of these networks. If these services are to achieve their desired level of service, however, careful attention must be paid to the way they are planned, implemented and, in particular, the way in which they are managed. 相似文献
4.
5.
Lesley Hansen 《Network Security》1997,1997(6):8-12
The network is only as secure as its weakest access point. At one extreme we have the totally open network with every user having open access to every area of the network. At the other we have the ultimate secure network with no user connections so that there are no insecure access points! Somewhere in between we have a balance in the security provided to maintain an easy to use and accessible network whilst reducing the risk of breaches to security. Today computing networks span the world with thousands of entry points. Remote access technologies and the Internet or corporate intranets further extend the network to include remote and mobile users. Whilst these technologies heighten the productivity of the organization they also increase the security risks. 相似文献
6.
7.
贾佳 《网络安全技术与应用》2014,(9):137-137
信息网络的迅速发展普及应用,在给人们的工作、生活带来巨大便利的同时,也带来了许多安全隐患,出于政治、经济、文化等利益的需要或者好奇心的驱动,网络攻击事件层出不穷、屡见不鲜,且有愈演愈烈之势,轻者给个人或机构带来信息损害、经济利益损失,重者将会影响国家的政治、经济和文化安全.因此,信息网络安全问题已成为国内外研究重点. 相似文献
8.
吴尚 《网络安全技术与应用》2014,(12):145-145
近年来,网络攻击事件时有发生,给社会和企业带来巨大威胁和损失,对于网络安全评估方法的研究成为了热点,文中介绍了网络安全评估方法的研究现状,分析了网络安全评估相关技术,进而探析了网络安全评估方法。 相似文献
9.
10.
11.
12.
13.
14.
思科安全解决方案可以分为:安全连接、周边安全、入侵防范、身份辨识、安全管理等几个方面。安全连接通过VPN实现,思科拥有VPN集中器和基于IOS的VPN。周边安全则采用防火墙来保障,思科在这方面的产品有PIX系列防火墙和基于IOS的防火墙。入侵检测或漏洞扫描的方式可以进行入侵防范,这类产品有专门的IDS产品和基于IOS的IDS。思科通过专门的ACS服务控制器(Radius,Tacas+)和基于IOS的功能模块完成身份识别功能。采用专用的安全策略管理和基于WEB的管理器进行安全管理。一、入侵防范入侵检测系统的作用类似于现实生活中的监视摄… 相似文献
15.
16.
17.
传感技术中网络安全问题是由传感器获取的信息或图象通过计算机网络传输时产生的 ,以保证网上获取信息的安全、可靠。主要论述采用口令、数据加密、防火墙、数字签名、网络安全管理技术。 相似文献
18.
19.
20.
《Computers & Security》1988,7(1):53-57
The process of improving network security begins with documenting the network configuration and its components Network management must know who the system users, are, what they are accessing, when, where, how, and why. Once management has this information, steps can be taken to ensure that only authorized users are accessing the network.To manage a successful telecommunications environment, there must be a balance between cost, security, risk, performance, and connectivity. The controls discussed here, when applied in the proper combination, can help to achieve this balance. A company must already have sound business practices such as adequate separation of duties, management approvals, and a development methodology.The controls contained here focus primarily on data communications and are environment independent. Specific hardware, software products, and services are mentioned as examples and should not be considered an endorsement.This article is based upon a white paper developed and published by the members of Nasig, the Network Access Special Interest Group, organized by the San Francisco Bay Area Chapter of the Information System Security Association (Issa), Inc. 相似文献