期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
网络黑客常用攻击手段 被引量:3
1
作者 鸣涧 《信息安全与通信保密》 2001年第10期68-68,共1页
黑客攻击手段可分为非破坏性攻击和破坏性攻击两类.非破坏性攻击一般是为了扰乱系统的运行,并不盗窃系统资料,通常采用拒绝服务攻击或信息炸弹;破坏性攻击是以侵入他人电脑系统、盗窃系统保密信息、破坏目标系统的数据为目的.下面为大... 黑客攻击手段可分为非破坏性攻击和破坏性攻击两类.非破坏性攻击一般是为了扰乱系统的运行,并不盗窃系统资料,通常采用拒绝服务攻击或信息炸弹;破坏性攻击是以侵入他人电脑系统、盗窃系统保密信息、破坏目标系统的数据为目的.下面为大家介绍4种黑客常用的攻击手段. 后门程序:由于程序员设计一些功能复杂的程序时,一般采用模块化的程序设计思想,将整个项目分割为多个功能模块,分别进行设计、调试,这时的后门就是一个模块的秘密入口.在程序开发阶段,后门便于测试、更改和增强模块功能.正常情况下,完成设计之后需要去掉各个模块的后门。 展开更多
关键词 计算机网络 网络安全 网络黑客攻击手段
原文传递
绿盟科技安全知识系列介绍之一
2
《数字化工》 2005年第5期56-56,共1页
关键词 网络管理 安全技术 信息安全 网络黑客攻击
下载PDF
A Solution Model to Protect Mobile Agents Against Malicious Host Attack
3
作者 迈克尔 徐良贤 《Journal of Shanghai Jiaotong university(Science)》 EI 2003年第1期1-5,共5页
Within an agent server, the model introduces a trusted third party entity called Secure Service Station(SSS). The SSS is a non\|hardware component and is intended to prevent most attacks performed by malicious hosts, ... Within an agent server, the model introduces a trusted third party entity called Secure Service Station(SSS). The SSS is a non\|hardware component and is intended to prevent most attacks performed by malicious hosts, by providing mechanisms that ensure attack detection and provide integrity to mobile agents. This noble technique involves encapsulating partial results obtained on each intermediate host and binding these results together using a hash function, thus forming a strong bonded chain that cannot be compromised. An analytical model to explore the system performance was also developed. 展开更多
关键词 mobile agent(MA) secure service station(SSS) agent host execution environment(EE)
下载PDF
Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology
4
作者 Xiaoqin Song 《International Journal of Technology Management》 2015年第10期50-52,共3页
In this paper, we conduct research on the essential network equipment risk assessment method based on vulnerability scanning technology. A growing number of hackers wanton invasion of the computer, through the network... In this paper, we conduct research on the essential network equipment risk assessment method based on vulnerability scanning technology. A growing number of hackers wanton invasion of the computer, through the network to steal important information, or destroy the network, the paralyzed which caused huge losses to the state and society. Find a known vulnerability rather than to find the unknown vulnerabilities much easier, which means that most of the attacker' s use is common vulnerabilities. Therefore, we adopt the advantages of the technique to finalize the methodology for the essential network equipment risk assessment which will be meaningful. 展开更多
关键词 Risk Assessment Vulnerability Scanning Network Security Essential Equipment.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部