首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
U盘作为灵活的移动存储载体,广泛运用于各种终端间的数据传输.但普通U盘本身的安全性很难得到保障,容易成为病毒的载体,甚至导致不同程度的泄密.本文结合数据单向传输的特点,针对病毒查杀的滞后性,基于VC平台,设计并实现了一种U盘保密软件,可以在一定条件下保障U盘在电脑间传输数据时的安全性.  相似文献   

2.
《Network Security》2001,2001(12):14-15
A company’s website is critical to it’s business. It relies on the site to provide information to its customers — as an interface to communicate with them or sell goods online. As such, it needs to be available 24 hours a day, seven days a week, providing a lightening fast response with first grade security. These things cannot always be achieved without a significant up-front investment and huge on-going costs. For many organizations it is a lot to take on. Unless a company has in-depth internal technical resources, outsourcing may be the way to go. Outsourcing promises to reduce the expense and eliminate many of the headaches associated with running an active and successful website.  相似文献   

3.
The primary concern of CRM is core customers from convergence environments. They show such passionate partnership with the company that they actively put forth their opinion to improve products and service through voluntary pro-company activities and participate in the development of new products through open innovation. Therefore, the top priority of a company should be given to defining its core customers and accurately understanding and managing them, which would contribute to the growth of the company. This study has the purpose to identify net promoter score (NPS) of company by adopting index that evaluates the degree of customer loyalty to the company in judging the relationship of company and customer, and later on establish strategy to increase the number of loyal customers by classifying customers by the score. It has become more important nowadays how to manage a long-term customer relationship, for it can assure the company of increased income in spite of steep competition with rival companies. Therefore strong customer relationship is an important means of proving the company with competitive edge and maximizing company income. In addition, as NPS serves as adjustment variable, net promoters were analyzed to contribute to store loyalty significantly. The way for bookstore ‘A’ to grow as a company with potential for future growth would be re-establish customers through one more in-depth analysis of customers as well as seek for methods to raise NPS.  相似文献   

4.
介绍硬盘保护卡的工作原理及其设置信息的组成结构与存储区域的特点,指出硬盘保护卡在使用过程中出现的一些非常规问题,这些问题产生的主要原因是某些恶意病毒的攻击和某些共享软件的登记操作所导致的硬盘保护卡工作时所依照的设置信息被破坏,并给出了相应问题的解决方案,较好地解决了系统的安全保护问题。  相似文献   

5.
文章设计了基于系统内核的全方位立体分级文件保护系统,该系统通过系统内核开发,实现对硬盘文件的透明加密与隐藏,从而实现文件的内容安全与自身安全,在保护文件中保存的内容不被泄露的同时,也保证了文件自身免受非法用户、木马、病毒及恶意代码轻易的篡改、破坏及窃取。  相似文献   

6.
计算机病毒的防治,是计算机信息安全研究领域的重要内容。对于计算机病毒传播情况的研究,是计算机病毒防治研究的重要组成部分。U盘病毒是一种具有代表性的常见病毒,文中主要研究U盘病毒的传播特征及瞬态行为,分析病毒到达稳态所需的时间的差异。首先通过U盘病毒的传播特点建立相应的数学模型,用多种参数对U盘病毒传播过程中的影响因素进行描述,并使用基于多主体的建模工具NetLogo对U盘病毒传播的过程进行仿真,分析了在参数改变的情况下U盘病毒的传播特点。  相似文献   

7.
近年来随着互联网的迅猛发展,计算机病毒呈现与繁殖传播越来越严重。电子邮件、浏览器、U盘已成为人们相互学习和交流的工具。然而,这些工具也随之成为计算机网络病毒的重要传播媒介。目前,由于计算机病毒广泛传播,已经成为计算机安全与应用的重要问题,该文首先从计算机病毒概念入手,简要分析了当前计算机病毒的特点、传播途径及感染后的主要症状。并针对这一现象提出了相应的防范措施。  相似文献   

8.
U盘的普及使U盘病毒繁衍迅速,针对信息系统安全保护的需要,设计出一种U盘病毒隔离器。该隔离器具有隔离Autorun病毒、防止PC的数据通过U盘泄密、防止PC中的病毒感染U盘的功能。隔离器能够快速捕获到U盘与主机之间所有底层数据,在此基础上,隔离器中的微控制器(MCU)通过分析、审计和过滤流过隔离器中的底层数据来实现上述功能。经实际检测,该设计能够实现预定功能。  相似文献   

9.
通过Delphi编程,实现了U盘的安全保护开关,及U盘病毒的防御与查杀,在办公和日常应用中都具推广意义。  相似文献   

10.
Insurance policies or credit instruments are financial products that involve a long-term relationship between the customer and the company. For many companies a possible way to expand its business is to sell more products to preferred customers in its portfolio. Data on the customers’ past behaviour is stored in the company’s database and these data can be used to assess whether or not more products should be offered to a specific customer. In particular, data on past claiming history, for insurance products, or past information on defaulting, for banking products, can be useful for determining how the client is expected to behave in other financial products. This study implements a method for using historical information of each individual customer, and the portfolio as a whole, to select a target group of customers to whom it would be interesting to offer more products. This research can help to improve marketing to existing customers and to earn higher profits for the company.  相似文献   

11.
How can you tell if an IT security product (or a product that includes security components) can secure your application? How can you be certain that a product will fully deliver on its claims that it will protect against malice in a deployed environment? Unfortunately, few vendors - and even fewer customers - can make these judgments. The article won't make you a security wizard, but it will give you a feel for what to look for in, and when to be concerned about, a vendor's claims. To ensure that a product has a chance of being secure; customers should check that vendors use adequate approaches in four primary areas. In order of importance (and maturity and availability), they are: quality-control (QC) mechanisms; cryptographic primitives; hardware assist mechanisms; and separation mechanisms.  相似文献   

12.
随着信息技术的发展,计算机被广泛应用于各个领域,其稳定性和安全性变得日益重要。本文主要通过对系统及时备份、硬盘数据保护、系统及病毒库定期更新的维护方案的分析,从而建立安伞的信息系统。进而在构建信息系统安全的实践中,提出一种适合研究所计算机网络系统心刖的三级安全管理措施设想,论述了信息系统安全的技术措施,并对建立管理制度提出建议。  相似文献   

13.
云计算具有巨大商机,但同时也面临着潜在的巨大风险,云安全问题是云计算发展的重要障碍。应用云安全技术识别和查杀病毒不再仅仅依靠本地硬盘中的病毒库,而是依靠庞大的网络服务,实时采集、分析和处理。文章着重从查杀病毒和木马的角度来阐述有关云安全的技术以及实现,探讨了云安全问题的概念和所涉及到的技术问题,研究了资源池的建立及杀毒产品对云安全策略的各种解决方案。  相似文献   

14.
Extranets are revolutionizing the way in which companies conduct business with suppliers, customers, and other business partners. They are opening up new channels for sharing information and conducting transactions by linking a company's internal networking system to external networks. As extranets open new business opportunities for a company, they also expose its internal networks to new security and performance risks. By identifying these risks, IS managers can develop network architectures to secure and guarantee extranet performance.  相似文献   

15.
针对特殊领域对大容量移动存储设备安全性的特殊要求,本文在SSX20-D安全芯片的基础上设计了存储数据安全保护、U盘密钥参数保护和U盘使用控制管理三层次的安全模型.采用了数据加密、U盘参数保护、加密密钥保护、口令硬件使用控制、U盘抗攻击等安全机制,将KEY的安全性拓展到大容量存储芯片中.特别是针对密钥参数保护这一安全薄弱环节设计了三级密钥保护方式,综合运用SM1算法、SHA-256算法和自定义函数确保密钥绝对安全.  相似文献   

16.
基于进程鉴别和隐藏的病毒主动式防御技术   总被引:10,自引:0,他引:10       下载免费PDF全文
邓璐娟  刘涛  甘勇  熊坤 《计算机工程》2007,33(5):117-119
根据行为自动监控、行为自动分析和行为自动诊断的新思路,利用进程鉴别和隐藏技术对信息安全进行研究。通过VC++6.0工具平台实现了病毒主动防御的目标,实际运行的系统证明该技术可以从根本上克服传统防病毒软件中信息保护滞后于新病毒出现的重大 缺陷。  相似文献   

17.
随着信息技术的快速发展,越来越多的重要数据存储在磁盘上,磁盘数据的安全保护逐渐成为备受关注的问题。本文通过对计算机硬盘数据结构的分析,结合人们对计算机硬盘数据安全的认识误区,全面地阐述了威胁计算机硬盘数据安全的几个因素及其防范措施。  相似文献   

18.
一种安全移动存储系统的研究与实现   总被引:1,自引:0,他引:1       下载免费PDF全文
针对移动存储设备的便利性带来的敏感数据的安全性问题,通过对移动存储设备的安全需求进行分析,提出一种安全的移动存储系统。分析系统中移动存储设备驱动、磁盘扇区读写操作、数据加密存储机制以及防毒策略设置等关键技术,构建一个原型系统,实现对移动存储设备中数据的加密和保护。  相似文献   

19.
计算机是信息系统的重要组成部分,它面临来自外部和内部的信息安全威胁。目前计算机终端上的防护方式主要针对来自网络和外部的病毒、木马和攻击等安全威胁,对于内部人员的疏忽和蓄意造成的泄密基本无能为力。此外,由于防护功能建立在待保护的计算机上,其本身可靠性受现有计算机硬件与操作系统的各种缺陷和漏洞的制约。文章提出了一种具备独立防护系统的安全计算机架构,理论分析和实践表明,该架构能够有效应对外部和内部的安全威胁,保护计算机本身及内部数据信息的安全。  相似文献   

20.
随着计算机技术的飞速发展,计算机信息安全问题越来越受关注。各种计算机病毒的泛滥,各种木马猖獗,各种黑客事件曝光等等问题。可以说互联网的计算机都是不安全的,这些计算机可以被网上的任一台计算机攻击,即使不联网,也可能被强行插入的物理设备携带的病毒攻击。如何保护我们计算机的信息安全不被侵犯是我们目前面临的问题。本文介绍了计算机信息安全技术的概要,并详细探讨了目前计算机的各种信息安全防护技术。告诉读者如何才能通过各种方式保护计算机信息,营造一个安全的计算机防护系统。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号