信息安全法律法规论文 下载本文

内容发布更新时间 : 2024/6/8 20:36:44星期一 下面是文章的全部内容请认真阅读。

计算机网络信息安全

法律法规论文

班级:12gb物联1班

学号:01210261y05 姓名:薛 瑞

1

摘要:网络电子商务在不断发展的同时。信息安全问题也显得愈为突出。作为保证信息安全重要手段之一的加密技术也扮演着越来越重要的角色。本文首先论述了网络信息安全的内涵,诠释了网络安全和网络黑客的含义,阐述了建立网络安全体系的重要性和目标。然后对计算机网络安全存在的问题和影响安全问题的因素进行了分析并举出了几种常见的网络攻击和应对计策。最后对网络安全防御体系进行了探讨,详细解释了防火墙技术、加密技术和生物识别技术。

关键字:防御管理 病毒 防火墙 加密 识别 信息技术 法律法规

2

目 录

一、前言······················································4 二、 计算机网络安全初步分析································5 2.1计算机网络安全和网络黑客的含义····························5

2.2网络安全的重要性··········································5 2.3网络安全定义及目标········································6 2.4网络安全的等级············································7

三、计算机网络安全问题解析·································8 3.1计算机网络面临的问题······································8

3.2影响网络安全的几个方面····································10 3.2.1计算机病毒的内涵·····································10 3.2.2网络资源共享性因素···································11 3.2.3网络开放性因素·······································11 3.3常见的计算机网络攻击及其防范对策··························11

四、网络安全策略·············································13

4.1物理安全策略物理安全策····································13 4.2政策保护策略··············································14

五、网络安全防御管理········································14 5.1网络安全防御体系的探讨····································14

5.2防火墙技术················································15 5.2.1防火墙的分类·········································15 5.2.2防火墙的主要功能·····································15 5.2.3防火墙的优缺点·······································16

5.3数据加密技术··············································16

5.4生物识别技术··············································16 5.5入侵检测技术··············································17 5.6安全审计技术··············································17

六、结束语····················································17

3