论文部分内容阅读
近年来随着Internet的飞速发展,计算机网络的资源共享进一步加强,随之而来的信息安全问题日益突出。据美国FBI统计,美国每年网络安全问题所造成的经济损失高达75亿美元。而全球平均每20秒钟就发生一起Internet计算机侵入事件。在Internet/Intranet的大量应用中,Internet/Intranet安全面临着重大的挑战,事实上,资源共享和安全历来是一对矛盾。在一个开放的网络环境中,大量信息在网上流动,这为不法分子提供了攻击目标。而且计算机网络组成形式多样性、终端分布广和网络的开放性、互联性等特征更为他们提供便利。他们利用不同的攻击手段,获得访问或修改在网中流动的敏感信息,闯入用户或政府部门的计算机系统,进行窥视、窃取、篡改数据。不受时间、地点、条件限制的网络诈骗,其“低成本和高收益”又在一定程度上刺激了犯罪的增长。使得针对计算机信息系统的犯罪活动日益增多。危害网络安全的因素很多,它们主要依附于各种恶意软件,其中病毒和木马最为一般网民所熟悉。针对这些危害因素,网络安全技术得以快速发展,这也大大提高了网络的安全性。文章分析了几种常见的网络入侵方法以及在此基础上探讨了网络安全的几点策略。
In recent years, with the rapid development of the Internet, the resource sharing of computer networks has been further strengthened. The ensuing problems of information security have become increasingly prominent. According to the US FBI statistics, the annual economic losses caused by cyber-security in the United States are as high as 7.5 billion U.S. dollars. An Internet computer intrusion took place every 20 seconds on average globally. Internet / Intranet security is facing major challenges in the large number of Internet / Intranet applications. In fact, resource sharing and security have always been a contradiction. In an open web environment, a great deal of information is flowing online, which provides the criminals with a target of attack. Moreover, the diversity of computer network components, the wide distribution of terminals and the openness and interconnectivity of the network provide them more convenience. They use different means of attack to gain access to or modify sensitive information flowing in the network, into computer systems of users or government departments, and to peek, steal and tamper with the data. Without the limitation of time, place and condition, “low cost and high profit” in turn stimulated the crime growth to a certain extent. Increasing criminal activity against computer information systems. There are a number of factors that threaten cybersecurity. They are mainly attached to various types of malware, among which viruses and trojans are familiar to most Internet users. In response to these hazards, the rapid development of network security technology, which also greatly improves the security of the network. The article analyzes several common methods of network intrusion and discusses some tactics of network security on this basis.