首页 internet security 网络安全论文

internet security 网络安全论文

举报
开通vip

internet security 网络安全论文InternetSecurityInternetsecurityisakindofcomputersecurityspecificallyrelatedtotheInternet,ofteninvolvingbrowsersecuritybutalsonetworksecurityonamoregenerallevelasitappliestootherapplicationsoroperatingsystemsonawhole。Itsobjectiveistoestablishrulesandmeasuresto...

internet security 网络安全论文
InternetSecurityInternetsecurityisakindofcomputersecurityspecificallyrelatedtotheInternet,ofteninvolvingbrowsersecuritybutalsonetworksecurityonamoregenerallevelasitappliestootherapplicationsoroperatingsystemsonawhole。ItsobjectiveistoestablishrulesandmeasurestouseagainstattacksovertheInternet.TheInternetrepresentsaninsecurechannelforexchanginginformationleadingtoahighriskofintrusionorfraud,suchasphishing.Differentmethodshavebeenusedtoprotectthetransferofdata,includingencryptionandfrom-the—ground-upengineering.WhencomputerusersfacewiththeproblemofInternetSecurity,acomputerusercanbetrickedorforcedintodownloadingsoftwareontoacomputerthatisofmaliciousintent。Suchsoftwarecomesinmanyforms,suchasviruses,Trojanhorses,spyware,andworms。However,peoplehaverealizedthenetworksecuritycrisis,Someonlinesitesoffercustomerstheabilitytouseasix—digitcodewhichrandomlychangesevery30–60secondsonasecuritytoken。Thekeysonthesecuritytokenhavebuiltinmathematicalcomputationsandmanipulatenumbersbasedonthecurrenttimebuiltintothedevice.Thismeansthateverythirtysecondsthereisonlyacertainarrayofnumberspossiblewhichwouldbecorrecttovalidateaccesstotheonlineaccount。Thewebsitethattheuserisloggingintowouldbemadeawareofthatdevices'serialnumberandwouldknowthecomputationandcorrecttimebuiltintothedevicetoverifythatthenumbergivenisindeedoneofthehandfulofsix—digitnumbersthatworksinthatgiven30-60secondcycle。After30–60secondsthedevicewillpresentanewrandomsix-digitnumberwhichcanlogintothewebsite,andtherearetoomanyfirewallssuchasPacketfilterStatefulpacketinspectionApplication-levelgatewayWhynowthehackersarealsooverbearing?Frommyperspective,itisduetothecurrentlegalloopholesandthelackofInternetusers’safetyconsciousness.Ithinkthatthecurrentlawsofnetworksecurityarenotstrongenough,inmyopinion,anetworksecuritylaw,isagenericdocumentthatoutlinesrulesforcomputernetworkaccess,determineshowpoliciesareenforcedandlaysoutsomeofthebasicarchitectureofthecompanysecurity/networksecurityenvironment。Thedocumentitselfisusuallyseveralpageslongandwrittenbyacommittee。Asecuritypolicygoesfarbeyondthesimpleideaof"keepthebadguysout”。It'saverycomplexdocument,meanttogoverndataaccess,web-browsinghabits,useofpasswordsandencryption,emailattachmentsandmore.Itspecifiestheserulesforindividualsorgroupsofindividualsthroughoutthecompany。Securitylawshouldkeepthemalicioususersoutandalsoexertcontroloverpotentialriskyuserswithinyourorganization.Thefirststepincreatingapolicyistounderstandwhatinformationandservicesareavailable(andtowhichusers),whatthepotentialisfordamageandwhetheranyprotectionisalreadyinplacetopreventmisuse.Inaddition,thesecuritylawshoulddictateahierarchyofaccesspermissions;thatis,grantusersaccessonlytowhatisnecessaryforthecompletionoftheirwork。Whilewritingthesecuritydocumentcanbeamajorundertaking,agoodstartcanbeachievedbyusingatemplate。NationalInstituteforStandardsandTechnologyprovidesasecurity—policyguideline.Thelawscouldbeexpressedasasetofinstructionsthatcouldbeunderstoodbyspecialpurposenetworkhardwarededicatedforsecuringthenetwork。Thereportshowsthatonly18.36%ofrespondents,Changethepasswordonaregularbasisandthepeoplewhowhentheyhaveaproblemtheychangethepasswordare64。59%ofrespondents,17.05%ofrespondentsneverchangethepassword。Inteenagedays,thejuniorhighschoolstudent,James,throughself—study”hackers"technologybatchingothercustomers'bankcards'informationandpasswordbymeansofnetworkattack,heusetheloopholeofpaymenttostealothersinformationandmakeexorbitantprofits。Inconclusion,itis。hightimethatwedidsomethingtokeepinformationsecure。Personally,lawsandregulationmustbeestablished。Besidestoimprovetechnologyisanthersolution。Meanwhile,wearesupposedtorousetheawarenessofself-protection。Onlyinthiswaycanweensureourrightsandinterest。ReferencesGralla,Preston(2007)。HowtheInternetWorks。Indianapolis:QuePub。ISBN 0-7897—2132—5.Rhee,M。Y。(2003)。InternetSecurity:CryptographicPrinciples,AlgorithmsandProtocols。Chichester:Wiley。ISBN 0-470-85285—2。MargaretRouse(September2005)。"Whatisasecuritytoken?”.SearchSecurity。com。Retrieved2014-02—14.WWW.BAIDU.COMWekipedia
本文档为【internet security 网络安全论文】,请使用软件OFFICE或WPS软件打开。作品中的文字与图均可以修改和编辑, 图片更改请在作品中右键图片并更换,文字修改请直接点击文字进行修改,也可以新增和删除文档中的内容。
该文档来自用户分享,如有侵权行为请发邮件ishare@vip.sina.com联系网站客服,我们会及时删除。
[版权声明] 本站所有资料为用户分享产生,若发现您的权利被侵害,请联系客服邮件isharekefu@iask.cn,我们尽快处理。
本作品所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用。
网站提供的党政主题相关内容(国旗、国徽、党徽..)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
下载需要: 免费 已有0 人下载
最新资料
资料动态
专题动态
个人认证用户
陈海
暂无简介~
格式:doc
大小:23KB
软件:Word
页数:3
分类:小学语文
上传时间:2021-12-29
浏览量:2