期刊文献+

计算机网络安全与防范策略研究 被引量:4

Computer Network Security and Prevention Strategies
下载PDF
导出
摘要 由于计算机网络在不断的发展,人类逐渐出现全球化和信息化发展的趋势。但是。因为计算机网络的联结形式存在多样性特点,终端分布又不均匀,网络自身开放性和互连性的特征,产生了很多黑客、怪客或者恶意软件以及其他不轨攻击等,因此网络信息的安全保证和保密性成为目前信息化发展的一个重要问题。无论在局域网又或者在广域网之中,始终都存在着认为以及自然等很多因素的潜在威胁。所以,计算机网络安全的防范措施就是要全方位地解决各种不同的潜在威胁,这样才能实现计算机网络信息的可用性、保密性和完整性。本文通过分析计算机网络安全受到的威胁因素,研究分析得出防范措施,以供参考。 Due to the continuous development of computer networks,human gradual emergence of the trend of globalization and information technology development.But.Computer network links the form of the diversity of the terminal uneven distribution of network openness and connectivity features,a lot of hacker,cracker or malware,and other misconduct attack,network information security assurance become an important issue for the development of information technology and confidentiality.Both in the LAN or WAN being always there with the potential threat that many factors and natural.Computer network security precautions is dealt with in all a variety of potential threats,so as to achieve the availability of the computer network of information,confidentiality and integrity.By analyzing the factors of computer network security threats,research and analysis to draw preventive measures for reference.
作者 田刚 陈晓华
出处 《计算机光盘软件与应用》 2012年第3期100-101,共2页 Computer CD Software and Application
关键词 计算机 网络 安全 防范 策略 Computer Network Security Prevention Strategy
  • 相关文献

参考文献5

二级参考文献9

  • 1[1]CERT Coordination Center. Available at http: //www. cert. org/stats/cert_stats. html. 2002
  • 2[2]Stallings W. Network and Internetwork Security Principles and Practice.NJ: Prentice Hall, 1995
  • 3[3]Li M, Jia W, Zhao W. Decision Analysis of Network - Based Intrusion Detection Systems for Denial - of - Service Attacks. 0 - 7803 - 7010 -4/01, 2001 IEEE
  • 4[4]Kumar S. Classification and detection of computer intrusions. Ph. D.Thesis, Purdue University, 1995
  • 5Fuggetta A, Picco G P, Vigna G. Understanding code mobility. IEEE Trans on Software Engineering, 1998, 24(5): 342 ~ 361
  • 6Sandhu R S, Coyne E J, Feinstein H L, et al. Role-Based access control. IEEE Computer, 1996, 29(2): 38 - 47
  • 7Cohen F. A note on the role of deception in information protection . http:// www. all. net, 2000
  • 8[美][D.E.科默]DouglasE.Comer,[美][D.L.史蒂文]DavidL.Stevens著,张娟,王海.用TCP/IP进行网际互连[M]电子工业出版社,1998.
  • 9赵季中,宋政湘,齐勇.对基于TCP/IP协议的几个网络安全问题的分析与讨论[J].计算机应用研究,2000,17(5):44-47. 被引量:30

共引文献7

同被引文献13

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部