Font Size: a A A

Research And Implement Of Network Security Assessent

Posted on:2011-11-13Degree:MasterType:Thesis
Country:ChinaCandidate:F XuFull Text:PDF
GTID:2178330332458867Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the network open,resource sharing,Terminal distribution,network border,agnostic and other reasons。The Internet to the people's work,living,learning and bringing lots of convenience also brings more and more serious network security problem:hacker attacks have become increasingly frequent, increasing cases of cyber-attacks, cyber crime hazards is growing。At the same time, e-government network in transforming government functions, improve administrative efficiency, to promote openness in government affairs, improved public services and so play an active role at the same time, the Chiefs official site has been invaded, the website data is tampered with the persistent occurrence of such cyber-crime.The site has been attacked time and again, people are constantly reflect on the root causes of network attack. According to Ministry of Public Security, Ministry of Information Industry and other authoritative statistical results show that:the vast majority of sites have been attacked because hackers using the web site are technical and management deficiencies. Therefore, the assessment of network security, develop and strengthen the weak links in network technology architecture and found that the vulnerability of network hosts and to provide a safe and timely reinforcement proposals for ensuring network security, normal, smooth operation have important practical significance and practical application of value.The project studies to be taken by a web-based simulated hacker attack on established methods active account ideas from the network architecture,security management,host viability,,operating system identification information,weak passwords, open ports/services,network equipment vulnerabilities,SQL injection,page comprehensively horses hanging assess.network vulnerability.
Keywords/Search Tags:Safety Assessment, Network Security, Network Vulnerability, Vulnerability Scanning
PDF Full Text Request
Related items