首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Computing operates in an almost universally networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.  相似文献   

2.
3.
核函数是SVM的关键技术,核函数的选择将影响着支持向量机的学习能力和泛化能力。各个普通核函数各有利弊,在分析各个普通核函数的基础上,采用了一种新的组合核函数,它既具有很好的泛化能力,也具有很好的学习能力,并将其构造的支持向量机应用到网络安全的风险评估中,与普通核函数构造的支持向量机的评估效果进行比较。结果表明组合核函数支持向量机不仅提高了分类速度,而且具有较高的分类精度。  相似文献   

4.
随着科学技术和网络信息技术的飞速发展,越来越多的网络信息安全问题逐渐出现.本文主要研究了网络信息安全和网络安全之间的关系,并且对如何创造安全的网络环境提出了几点建议.  相似文献   

5.
Fred Cohen 《Network Security》1998,1998(10):10-14
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. This series of articles takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.  相似文献   

6.
This article discusses common vulnerabilities associated with Unix networking and how attackers could exploit these vulnerabilities. Having identified a range of vulnerabilities it then details some of the configurations and countermeasures that can be used to secure a host against them.  相似文献   

7.
网络安全综述   总被引:17,自引:2,他引:17  
随着计算机网络的不断发展,全球信息化已成为人类发展的大趋势,但由于计算机网络具有联结形式多样性、终端分布不均匀性和网络的开放性、互连性等特征,致使网络易受攻击,所以网上信息的安全和保密是一个至关重要的问题。无论是在局域网还是在广域网中,都存在着自然和人为等诸多因素的脆弱性和潜在威胁。网络的安全措施应是能全方位地针对各种不同的威胁和脆弱性,这样才能确保网络信息的保密性、完整性和可用性。  相似文献   

8.
As networks become large and heterogeneous, network administrators need efficient tools for monitoring network activities and enforcing global security. In open environments such as universities and research organisations, it is rather difficult to prevent access to core network resources without restricting users’ freedom.Ntop is an open-source web-based traffic measurement and monitoring application written by the authors and widely available on the Internet. This paper shows how ntop can also be effectively used for network security as it is able to identify potential intruders and security flaws, as well as discover misconfigured or faulty applications that generate suspicious traffic.  相似文献   

9.
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. This series of articles takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.  相似文献   

10.
对网络安全问题的探讨   总被引:3,自引:9,他引:3  
分析了黑客经过侦察、扫描、攻击、维护访问权和掩盖踪迹等几个阶段实施攻击的一般过程和攻击工具的新特点,分析了系统脆弱性研究的概况,说明了源码分析、反汇编、调试、网络数据包分析、黑箱测试法、基本原理分析法和类推法等发现系统脆弱性的方法,提出了一些加强系统安全的措施。  相似文献   

11.
TCP/IP协议的开放性创造了互联网高速发展,同时因其固有的安全缺陷为用户带来了越来越多的安全问题。本文从目前国内外存在的网络安全问题出发,详细介绍了局域网络安全现状和存在的安全问题,提出了较为科学的安全防护措施。  相似文献   

12.
本文对计算机网络安全中存在的问题从网络层面,物理层面,操作系统层面进行了详细的分析,并提出了相应的防范措施。  相似文献   

13.
傅莉 《信息网络》2003,(3):23-25
随着计算机网络的发展,网络安全的重要性逐渐为人们所重视。本论述了网络安全问题的现状以及影响网络安全的因素,提出了加强网络安全的十项措施。(1)完善网络管理制度;(2)安装系统补丁程序;(3)对泄密的防范;(4)采用防火墙技术;(5)加密技术的使用;(6)进行身份验证;(7)进行存取控制;(8)安全审计 ;(9)病毒防范;(10)对重要资料进行备份。  相似文献   

14.
15.
随着计算机网络技术的不断发展,已经无所不在的影响着社会的政治、经济、文化、军事、意识形态和社会生活等各个方面,网络在给人们生活、工作带来各种便利的同时,随之而来的是各种网络安全问题。本文分析了目前计算机网络存在的主要问题,并针对这些问题提出了一些网络安全的防范措施,使大家认识并了解这些漏洞的危害,从而更好的保护自己的计算机。  相似文献   

16.
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. This series of articles takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.  相似文献   

17.
校园网络安全分析与安全体系方案设计   总被引:1,自引:0,他引:1  
张栋毅 《计算机应用》2011,31(Z2):116-118
分析了校园网络面临的安全风险,针对校园网络面临的安全风险,提出了基于防火墙网络访问控制、入侵检测技术、虚拟专用网技术、内部虚拟局域网(VLAN)划分、终端安全管理的安全体系解决方案,并对ICMP攻击、TCP SYN FLOOD攻击和Smurf攻击进行了安全测试.测试表明:该方案能有效防御攻击,具备静态的被动的防御和主动防御功能,能够给予校园网络较大的安全防护.  相似文献   

18.
We consider a communication network with random network coding which can be attacked by adversaries of two types. One of them can wiretap original packets outgoing from source to destination. The other can insert its own packets into information flow, which are wrong messages for the receiver. To provide secure communication, we use a scheme based on combining the GPT (Gabidulin-Paramonov-Tretjakov) public key cryptosystem and SKK (Silva-Kschischang-Koetter) codes. Encrypted packets are transmitted to the destination through wired channels. Performance of this system is investigated. The main result is that the proposed scheme is secure against wiretapping and insertion attacks under some conditions which depend on rank code parameters.  相似文献   

19.
20.
网络安全技术综述   总被引:1,自引:0,他引:1  
阐述了网络安全的基本概念与分类,介绍了当前网络安全技术的主流产品,同时,着重评述了无线传感器网络安全研究现状。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号