期刊文献+

计算机网络安全策略探讨 被引量:1

Explore the Computer Network Security Strategy
下载PDF
导出
摘要 随着网络信息的飞速发展,网络系统的安全问题也变得越来越严重。因此,如何加强网络安全防范手段、确保网络信息的安全已经成为了人们非常重视的问题。该文主要分析了几种常见的网络安全策略,并提出了变被动防御到主动防御的思想。 With the rapid development of network information,The problem of network security has become more and more serious.So,How to strengthen the network security means、ensure the security of network information has become the people attach great importance to the problem.This thesis analyzes some common network security strategy,Puts forward and become the passive defense to active defense thoughts.
出处 《电脑知识与技术》 2011年第4X期2809-2810,共2页 Computer Knowledge and Technology
关键词 网络安全 策略 蜜罐 network security strategy honeypot
  • 相关文献

参考文献2

二级参考文献30

  • 1曹爱娟,刘宝旭,许榕生.网络陷阱与诱捕防御技术综述[J].计算机工程,2004,30(9):1-3. 被引量:27
  • 2[1]Stoll C. Stalking the wily hacker[J]. Communications of the ACM,1988, 31(5) :484 -497.
  • 3[2]Cheswick B. An Evening with Berferd In Which a Cracker is Lured,Endured, and Studied[ A]. Proceedings of the Winter 1992 Usenix conference[ C], 1992.
  • 4[3]Cohen F. Internet Holes - Internet Lightning Rods[ J/OL]. Network Security Magazine, http://all. net/journal/netsec/9607 -2. html,1996.
  • 5[4]Cohen F. A Note on the Role of Deception in Information Protection[J]. Computers and Security, 1998, 17:483 - 506.
  • 6[5]Cohen F. A Mathematical Structure of Simple Defensive Network Deceptions[J]. Computers and Security, 2000, 19:520 -528.
  • 7[6]Cohen F. Deception Toolkit [ EB/OL]. http://www. all. net/dtk,1998.
  • 8[7]Neo Worx. Specter[ EB/OL]. http://www. specter. com, 1999.
  • 9[8]Recourse Technologies Inc. Mantrap[ EB/OL]. http://www. recourse. com, 1999.
  • 10[9]Network Associates Technology Inc. CyberCop Sting[ EB/OL]. http://www. nai. com, 1999.

共引文献33

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部