网络与信息安全概论 下载本文

内容发布更新时间 : 2024/12/27 6:20:31星期一 下面是文章的全部内容请认真阅读。

l29, the company responsible for a variety of procedures for reimbursement document, invoice review, approval of work; 30, regularly convened general meeting of shareholders, preparation work for the meeting; 31, the company responsible for payroll management jobs, including around salary survey, employee salary, salary accounting methods developed, payroll accounting, payment of wages, bonuses; 32, the company responsible for delivery of financial procedures; 33, according to the company's strategic development plan, the preparation and management of funds to meet day-to-day operating funding requirements to ensure the company's safety, liquidity and profitability of the funds; 34, responsible for the environmental protection building materials Corporation issued by the Corporation Annual, monthly economic indicators in the assessment of the economic responsibility system of proposed amendments; 35, the company responsible for all types of contracts and tracking, implementation, implementation of the agreement, abnormality was detected in time to take appropriate measures and feedback to the leadership; 36, regular inspection, analysis, budget implementation of the business and financial performance, and to propose measures to increase revenue and reduce expenditure; 37, responsible for organizing the company's contracting business tenders; 38, responsible for preparing the annual budget and final accounts, distribution of profits, loss compensation plan; 39, responsible for the violations of financial discipline, or damage the company's interests (corruption and bribery) review of the Act; 40, 第一章 网络安全概述

ζ安全的基本含义:客观上不受威胁,主观上不存在恐惧.

`网络信息安全概念:通俗的说,网络信息安全主要是指保护网络信息系统,使其没有危险、不受威胁、不出事故。从技术角度来说,网络信息安全的技术特征主要表现在系统的保密性、完整性、真实性、可靠性、可用性、不可抵赖性、可控性等方面。

网络信息安全的核心及其本质:网络信息安全的核心是通过计算机、网络、密码技术和安全技术,保护在公用网络信息系统中传输、交换和存储消息的保密性、完整性、真实性、可靠性、可用性、不可抵赖性、可控性等。

ζ(开放系统互连)OSI安全体系结构:它定义了5类安全服务、8种特定的安全机制、5种普遍性安全机制。5类安全服务:鉴别,访问控制,数据机密性,数据完整性,抗否性(不可抵赖性);8种安全机制:加密、数字签名机制、访问控制机制、数据完整性机制、鉴别交换机制、通信业务填充机制、路由选择控制机制、公证机制。

ζ网络信息安全面临的主要威胁:1.人为或自然威胁 2.安全缺陷 3.软件漏洞 4.病毒和黑客入侵

ζ网络安全模型:P2DR安全模型:(1)策略.(2)保护.(3)检测.(4)响应 PDRR安全模型:(1)保护 .(2)检测. (3)反应.(4)恢复

第二章 密码学

♂被隐蔽的消息称作明文,通常以m表示;密码可将明文变换成另一种隐蔽形式,称为密文,通常以c表示。

♂这种由明文到密文的变换称为加密。由合法接收者从密文恢复出明文的过程称为解密(或脱密)。

♂非法接收者试图从密文分析出明文的过程称为破译。对明文进行加密时采用的一组规则称为加密算法,通常以E表示。

♂对密文解密时采用的一组规则称为解密算法,通常以D表示。

加密算法和解密算法是在一组仅有合法用户知道的秘密信息的控制下进行的,该秘密信息称为密钥,加密和解密过程使用的密钥分别称为加密密钥和解密密钥。

♂如果以密钥为标准,可将密码系统分为单钥密码(又称为对称密码或私钥密码)和双钥密码(又称为非对称密码或公钥密码)。

`单钥密码的特点是:无论加密还是解密都使用同一个密码,因此,此密码体制的安全性就是密钥的安全。如果密钥泄漏,则此密码系统便被攻破。单钥密码的优点是安全性高,加、解密速度快。缺点是(1)随着网络规模的扩大,密钥的管理成为一个难点(2)无法解决消息确认问题(3)缺乏自动检测密钥泄漏的能力;

双钥密码的特点:由于双钥密码体制的加密和解密不同,且能公开加密密钥,而仅需保密解密密钥,所以双钥密码不存在密钥管理问题。双钥密码还有一个优点是可以 拥有数字签名等新功能。缺点是算法一般比较复杂,加、解密速度慢。 如果以密码算法对明文的处理方式为标准,则可将密码系统分为分组密码和序列密码。分组密码的加密方式是首先将明文序列以固定长度进行分组,每一组明文用相同的密钥和加密函数进行加密。序列密码的加密过程是把明文序列与等长的密钥序列进行逐位模相加。解密过

l29, the company responsible for a variety of procedures for reimbursement document, invoice review, approval of work; 30, regularly convened general meeting of shareholders, preparation work for the meeting; 31, the company responsible for payroll management jobs, including around salary survey, employee salary, salary accounting methods developed, payroll accounting, payment of wages, bonuses; 32, the company responsible for delivery of financial procedures; 33, according to the company's strategic development plan, the preparation and management of funds to meet day-to-day operating funding requirements to ensure the company's safety, liquidity and profitability of the funds; 34, responsible for the environmental protection building materials Corporation issued by the Corporation Annual, monthly economic indicators in the assessment of the economic responsibility system of proposed amendments; 35, the company responsible for all types of contracts and tracking, implementation, implementation of the agreement, abnormality was detected in time to take appropriate measures and feedback to the leadership; 36, regular inspection, analysis, budget implementation of the business and financial performance, and to propose measures to increase revenue and reduce expenditure; 37, responsible for organizing the company's contracting business tenders; 38, responsible for preparing the annual budget and final accounts, distribution of profits, loss compensation plan; 39, responsible for the violations of financial discipline, or damage the company's interests (corruption and bribery) review of the Act; 40,程则是把密文序列与等长的密钥序列进行逐位模相加。序列密码的安全性主要依赖于密码序列。

数字签名原理:

常用经典密码算法:DES、IDEA、RSA、D-H等; D-H算法:基于有限乘法群的离散对数问题

RSA算法:用途:数字签名、身份认证;基本思想:大整数的素数因子分解;缺点:计算速

l29, the company responsible for a variety of procedures for reimbursement document, invoice review, approval of work; 30, regularly convened general meeting of shareholders, preparation work for the meeting; 31, the company responsible for payroll management jobs, including around salary survey, employee salary, salary accounting methods developed, payroll accounting, payment of wages, bonuses; 32, the company responsible for delivery of financial procedures; 33, according to the company's strategic development plan, the preparation and management of funds to meet day-to-day operating funding requirements to ensure the company's safety, liquidity and profitability of the funds; 34, responsible for the environmental protection building materials Corporation issued by the Corporation Annual, monthly economic indicators n the assessment of the economic responsibility system of proposed amendments; 35, the company responsible for all types of contracts and tracking, implementation, implementation of the agreement, abnormality was detected in time to take appropriate measures and feedback to the leadership; 36, regular inspection, analysis, budget implementation of the business and financial performance, and to propose measures to increase revenue and reduce expenditure; 37, responsible for organizing the company's contracting business tenders; 38, responsible for preparing the annual budget and final accounts, distribution of profits, loss compensation plan; 39, responsible for the violations of financial discipline, or damage the company's interests (corruption and bribery) review of the Act; 40,度比较慢

DES是一种单钥密码算法,它是一种典型的按分组方式工作的密码,其基本思想是将二进制序列的明文分成每bit一组,用长为64bit的密钥对其进行16轮代换和换位加密。嘴鸥形成密文。

基本原理:单钥加密原理、双钥加密原理、数字签名原理; 单钥加密算法和双钥加密算法各自的特点及密钥管理的区别。

第三章 网络安全应用

IPSec协议:IPSec提供的服务(认证、数据完整性验证、保密)、提供的三种保护形式(认证头、封装安全载荷、互联网密钥管理协议)、两种工作模式(传输模式和隧道模式);

♀身份鉴别:基于共享的秘密密钥的鉴别协议(质疑-回答的协议)、基于公开密钥方法的鉴别协议;(了解)

♀Web安全:SSL协议,设计目标是在TCP基础上提供一种可靠的端到端的安全服务,其服务对象一般是WEB应用。 (两个重要概念:SSL连接、SSL会话)

TLS协议、 S-HTTP协议、

S/MIME协议保证邮件安全(证明发件人的身份、信息的完整为性、隐私保护和数据的安全性):加密过程:对邮件正文进行 散列计算,并声称一个散列值;使用发信人的私钥加密散列值;使用对称加密密钥加密邮件正文。

S/MIME邮件由三部分组成 :邮件散列值、对称机密随机密钥、加密的正文

♀SET(安全电子交易)协议:核心技术包括公开密钥加密、数字签名、电子信封、电子安全证书。是一个安全协议的集合