信息安全法律法规论文

信息安全法律法规论文

ID:9173754

大小:27.04 KB

页数:19页

时间:2018-04-20

信息安全法律法规论文_第1页
信息安全法律法规论文_第2页
信息安全法律法规论文_第3页
信息安全法律法规论文_第4页
信息安全法律法规论文_第5页
资源描述:

《信息安全法律法规论文》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库

1、计算机网络信息安全法律法规论文班级:12gb物联1班学号:y05姓名:薛瑞19摘要:网络电子商务在不断发展的同时。信息安全问题也显得愈为突出。作为保证信息安全重要手段之一的加密技术也扮演着越来越重要的角色。本文首先论述了网络信息安全的内涵,诠释了网络安全和网络黑客的含义,阐述了建立网络安全体系的重要性和目标。然后对计算机网络安全存在的问题和影响安全问题的因素进行了分析并举出了几种常见的网络攻击和应对计策。最后对网络安全防御体系进行了探讨,详细解释了防火墙技术、加密技术和生物识别技术。关键字:防御管理病毒防火墙加密识别信息技术法律法规19目录

2、一、前言······················································4二、计算机网络安全初步分析································52.1计算机网络安全和网络黑客的含义····························52.2网络安全的重要性··········································52.3网络安全定义及目标········································62.4网络安全的等级····

3、········································7三、计算机网络安全问题解析·································83.1计算机网络面临的问题······································83.2影响网络安全的几个方面····································103.2.1计算机病毒的内涵·····································103.2.2网络资源共享性因素···············

4、····················11193.2.3网络开放性因素·······································113.3常见的计算机网络攻击及其防范对策··························11四、网络安全策略·············································134.1物理安全策略物理安全策····································134.2政策保护策略·································

5、·············14五、网络安全防御管理········································145.1网络安全防御体系的探讨····································145.2防火墙技术················································155.2.1防火墙的分类·········································155.2.2防火墙的主要功能·····························

6、········155.2.3防火墙的优缺点·······································165.3数据19加密技术··············································165.4生物识别技术··············································165.5入侵检测技术··············································175.6安全审计技术····························

7、··················17六、结束语····················································17一、前言19网络安全已被信息社会的各个领域所重视。随着计算机网络的不断发展,全球信息化已成为人类发展的大趋势;给政府机构、企事业单位带来了革命性的改革。但由于计算机网络具有联结形式多样性、终端分布不均匀性和网络的开放性、互连性等特征,致使网络易受黑客、病毒、恶意软件和其他不轨的攻击,所以网上信息的安全和保密是一个至关重要的问题。对于军用的自动化指挥网络、C3I系统、银行和政府等传输敏感

8、数据的计算机网络系统而言,其网上信息的安全和保密尤为重要。因此,上述的网络必须有足够强的安全措施,否则该网络将是个无用、甚至会危及国家安全的网络。无论是在局域网还是在广域网中,都

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。