期刊文献+

机房计算机网络漏洞与病毒防御 被引量:2

Computer Network Vulnerability and Virus Defense in Computer Room
下载PDF
导出
摘要 信息技术发展到今天,随着技术的不断进步,网络安全问题也经常发生。小到自家电脑的入侵,大到棱镜门的监控,所以网络环境中无时无刻都受到病毒、黑客等因素的威胁,从而导致自身乃至于国家的数据库、文档、数据等资料受到入侵和破坏。例如,在2018年勒索病毒入侵个人电脑事件中该病毒就利用各种方式各种渠道侵入个人及公司电脑,用代码方式攻击获取服务器控制权,向被控制的计算机勒索比特币,就算是真正支付了比特币,病毒依然会存在。据部分统计显示,每年中用户计算机中泄露的信息和数据高达数十亿条,拥有云计算、大数据技术的FACEBOOK也出现数据信息泄露的问题,问题呈现持续增长的趋势。 With the development of information technology today, with the continuous progress of technology, network security problems often occur. From the intrusion of personal computers to the monitoring of prism gates, the network environment is constantly threatened by viruses, hackers and other factors, resulting in the intrusion and destruction of its own and even national databases, documents, data and other data. For example, in the 2008 blackmail virus intrusion into personal computers, the virus used various ways and channels to invade personal and corporate computers, using code attacks to gain server control, to blackmail the controlled computer for bitcoin, even if the real payment of bitcoin, the virus will still exist. According to some statistics, billions of information and data are leaked from users’ computers every year. FaceEBOOK, which owns cloud computing and big data technology, also has the problem of data information leaking. The problem shows a growing trend.
作者 白益铖 乔毅 邱霜玲 BAI Yi-cheng;QIAO Yi;QIU Shuang-ling(Sichuan Engineering Technical College,Deyang Sichuan 618000)
出处 《数字技术与应用》 2019年第4期197-198,共2页 Digital Technology & Application
关键词 计算机 网络 信息安全 防护策略 网络漏洞 computer network information security protection strategy network vulnerability
  • 相关文献

参考文献3

二级参考文献9

共引文献17

同被引文献7

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部