Font Size: a A A

Business-critical Network Security Issues And Solutions Program

Posted on:2006-04-22Degree:MasterType:Thesis
Country:ChinaCandidate:M DengFull Text:PDF
GTID:2208360212455791Subject:Computer technology
Abstract/Summary:PDF Full Text Request
By the development of the network technique, the network's open, share and connectting degree are extend increased. Because it contains some characteristics like share, easy proliferation and so on, the computer information has serious hidden secrity problems in Processing, saving, delivering and using and is very easily been disturbed, abuse, Leak and throw. Evenly, it is been revealed, stolen, distorted, pretended, and infect by the computer viruses.After analysing the present condition of information secrity, the thesis introduce the definition of the information safety, including integrity, usage, confidentiality control, Credibility, etc.. Then the thesis analyze the most importend and familiar network attack means: DoS (Denial Of Service). The final purpose of the DoS is the network server system collapsing and terminating. DoS includes several kinds: Flooding, Smurfing, Fragment Attack, Nuking(Out of Band), DdoS(Distributed Dos) and etc.. Finally the thesis analyse the basic principle of the DoS. For dealling with the DoS, it is the most important to support the safety of the host server.The malicious software include: Logic bomb, Backdoor, Worm, virus, and Trojan etc.. The malice softwares are all particular procedures that running in the system to break system, steal the system secret.and invade into system. The other familiar attack methods include: using the flimsiness of the system software or the system backdoor. The inside safe loophole and the CGI( the Common Gateway Interface ) attack is also important safety suffer. After analysing the technique principles of those attack means, The thesis give some measures to deal with.Aim at the extensive applied TCP/ IP protocol, the thesis mainly discussed the TCP/ IP protocol and its safety problems. Firstly, the thesis brief introduces the TCP/ IP protocol model and the functions of each protocol. Secondly the thesis...
Keywords/Search Tags:NETWORK SECRITY, ATTACK ACTION, HIDDEN SECRITY PROBLEM, SYSTEM PLAN, FIREWALL, PACKAGE FILTER
PDF Full Text Request
Related items