检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:云圆圆 张安宁 袁广恋 Yun Yuanyuan;Zhang Anning;Yuan Guanglian(Jiangsu Golden Shield Detection Technology Co.,Ltd.,Nanjing 210042,China)
机构地区:[1]江苏金盾检测技术股份有限公司,江苏南京210042
出 处:《无线互联科技》2023年第15期155-158,165,共5页Wireless Internet Technology
摘 要:随着科技的不断发展,计算机网络与人们的日常生活变得息息相关,但全球的网络安全问题也十分紧张,黑客和反黑客、破坏和反破坏的斗争无时无刻不在网络中发生着,如从网上银行被克隆、用户资金被盗取到蠕虫、木马、钓鱼网站、恶意软件的侵扰等,每一项都危害极大。在此背景下,解决好计算机网络安全漏洞问题变得至关重要。文章首先对网络安全漏洞的概念及特点进行了归纳总结,其次介绍了计算机硬件、软件和操作系统的安全漏洞分类和攻击性原理,最后提出了优化防火墙技术、实施服务器安全控制、建立健全相关的网络安全法规等具体策略,对于防范计算机网络安全漏洞具有一定现实意义。With the continuous development of science and technology,computer network and our daily life become closely related,but the global network security issues are also very tense,hackers and anti-hackers,destruction and anti-destruction of the struggle in the network all the time,such as from the online bank is cloned,stolen user funds to worms,Trojan horses,phishing websites,malicious software infestation and so on.Each is extremely harmful.In this context,it becomes very important to solve the problem of computer network security vulnerability.This paper firstly summarizes the concept and characteristics of network security vulnerabilities,introduces the classification and offensive principles of computer hardware,software and operating system security vulnerabilities,and finally puts forward the optimization of firewall technology,the implementation of server security control,establish and improve the relevant network security regulations and other specific strategies,which have certain practical significance for preventing computer network security vulnerabilities.
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.7