Methods and means to prevent computer security threats. Security threats in computer network security
(A) the threat of hardware systems and network environment
Computer hardware system failures such as power failure, line interception and alarm system can easily affect the security of computer networks, and it is difficult to control the security risks of computer network operating systems because each computer network operating system is equipped with a background management system. The computer network is designed in an open and long-span environment with decentralized control, resource sharing and packet switching. However, it is precisely because of this open and long-span network environment that hackers and viruses invade and easily cause serious damage to computer networks. At the same time, due to the concealment of computer network, it is impossible to accurately identify the true identity of network users, which further increases the threat to computer network.
(B) the threat of network communication protocols to network security
At present, the network communication protocol group is the most important interconnection protocol among computer network interconnection protocols. Among them, the network communication protocol group mainly connects different computer network hardware systems and different computer operating systems to provide support systems for computer network communication. However, because the computer network communication protocol is an interconnected and open protocol, in the process of designing the network communication protocol,
Due to the lack of comprehensive consideration of computer network security and other related issues, computer network security has problems with network communication protocols, and there are some loopholes in the network communication protocols themselves, which further leads hackers and criminals to use TCP to steal important information and data during the connection process, causing serious damage to the computer network system, and finally leading to the computer network not working normally.
(C) the IP source path is unstable
Because the IP source path is unstable in the operation of the computer network, when users use the computer network to send information or important data, it is easy for hackers and criminals to invade the system and change the original IP library, which leads to the important information and data sent by users being sent to the IP address modified by criminals, so as to obtain the important data of users and obtain illegal benefits from them.
Two, computer network security problems prevention and daily maintenance measures analysis
(A) the rational configuration of the firewall
In the computer network, by configuring the firewall, we can control the access scale of network communication, make it clear that visitors and data can enter the network system, and intercept those who are not allowed or other illegal elements and data in time, thus effectively preventing hackers or illegal elements from entering and destroying the network. As an effective network security mechanism, firewall has been widely used in network systems to prevent the invasion of unsafe factors in computer networks to the greatest extent.
(2) Security authentication means
Digital envelope technology is used to ensure the confidentiality of information in e-commerce; In order to ensure the integrity of e-commerce information, digital summarization technology with Hash as the core function is adopted; Ensure the validity of e-commerce information by using digital timestamp; Digital signature technology is used to ensure the non-repudiation and non-repudiation of communication in e-commerce; In order to ensure the identity authentication of all parties in e-commerce transactions, a CA authentication system is established, so that all parties in e-commerce transactions can carry out digital authentication, and at the same time, security protocols must be attached. Commonly used security protocols include secure socket layer SSL protocol and secure electronic transaction set protocol. Moreover, because the administrator account has the highest system authority in the computer network, hackers often steal accounts and destroy computer programs. In order to prevent this kind of network threat, we should first set a complex and powerful password on the administrator account or rename the administrator account, and finally create an administrator account with no administrative authority in the system to deceive the intruders, which will lead to the intruder's inability to distinguish whether the account has administrative authority, thus reducing the intruder's damage to important information in the computer network and system.
(3) Encryption technology
The implementation of computer network encryption technology is mainly a preventive measure to prevent the leakage of network information and data. Encryption technology mainly converts plaintext data in computer network system into encrypted data according to a certain conversion method. Among them, the traditional encryption technology is mainly based on messages. Compared with the traditional encryption technology, this encryption technology not only has unique requirements, but also the large database management system of this technology mainly uses Unix and WindowsNT. The security level of encryption technology operating system can be divided into C 1 and C2, which have the functions of identifying users, registering users and controlling users. In the computer network system, although DBES can add security precautions to the OS-based system, there are still some security risks in the computer network database system, and viruses and hackers will generally harm the database from these subtle loopholes. Using encryption technology to encrypt sensitive data can effectively ensure the security of data, thus ensuring the safe and reliable operation of the computer system.
Third, summary.
The security and reliability of computer network has always been a hot issue in research. Computer network security directly affects the development and application of computer technology. Although there are many products and technologies used for network security at present, there are still phenomena such as hacker intrusion and virus infection. Therefore, we should constantly develop new computer network prevention measures, implement advanced computer network technology and computer system, strengthen daily computer protection, and protect computer network security and information data security, thus bringing great convenience to computer users and truly enjoying the benefits brought by network information.
Precautionary measures for computer network security 1, the necessity of computer network security.
With the rapid development of computer network technology in recent years, there are more and more types of security problems, and computer network security prevention has become an inevitable process. After the research and induction of relevant scholars, there are the following threats to computer network security:
1. 1 harm caused by computer network system vulnerabilities
The so-called vulnerability of computer network system itself mainly refers to the unsafe service, configuration and initialization of computer network. If the system has loopholes in these aspects, it will easily lead to the paralysis of the computer network system and pose an inestimable threat to the network. In order to reduce the security risks caused by system vulnerabilities, staff should check the system regularly and update the system patches in time to prevent the security risks caused by system vulnerabilities.
1.2 Harm of computer network harmful programs to network security
Viruses and Trojans are common harmful programs in computer networks, and they often appear when downloading or updating the system. People are more and more dependent on and applied to computer networks, which makes many criminals make computer network viruses and Trojans for their personal interests, and viruses and Trojans are undoubtedly a bomb of computer network security.
1.3 Threat of unsafe connection between cable and computer network
The application of computer network system makes online dialing possible, but there are also hidden dangers such as impersonation and eavesdropping in this operation. Eavesdropping is the most common security problem caused by cable connection. This is because in the computer network system, it is necessary to read the required data at each node, so this process is one of the processes that are easy to cause security risks.
1.4 Other threats in the computer network
Theft, espionage and identity errors are also common security threats in computer networks. With the popularity of the Internet, the phenomenon of computer theft has become more and more serious, which has caused serious losses to the owners. For convenience, people often store some important files in their work or life in computers. Once the computer is stolen, it will cause immeasurable losses to the owner.
1.5 computer network security risks caused by authentication
If the algorithm of some programs in the computer network is not perfect and there are password traps, this will pose an identity authentication threat. In order to ensure the security of people's computers, people often set user names and passwords for their computers. The most important thing at this time is the password setting. The necessary feature of password setting is that it cannot be changed at will, which is more difficult. Only in this way can we avoid the threat of identity authentication to computer network security.
2. Effective measures to prevent computer network security.
Computer network security can be considered from two aspects: technology (data backup, physical isolation gateway, firewall technology, encryption technology) and management. After investigation, the effective measures to solve the computer network security problems are as follows:
2. 1 Back up the necessary data.
The advantage of data backup is that even if the computer network is illegally invaded or destroyed, those important data can still be recovered from a hard disk and other places. There are usually full backup, incremental backup and differential backup when backing up data.
2.2 Application of firewall technology in the system
Firewall is divided into the ranks of software in the composition of computer, and its position is between the computer and the network it is connected to. Because computers need to be scanned by firewalls when transmitting and sending information, some bad information can be audited and filtered to ensure the security of computer network information. In addition, the firewall can not only close unused ports, but also prohibit access to special websites, thus ensuring the security of computer networks.
2.3 the application of encryption technology in computer network security protection
The process of encrypting the important information of computer network is to process the original important data in a certain computer language to make it have unreadable codes. When using, only the encrypted files or data can be used normally after decryption, so as to achieve the encryption effect. Smart card technology is the brother technology of data encryption technology, and it is a key medium, similar to people's credit cards, so the application of smart card technology greatly improves the security of computer networks.
2.4 Strengthen computer network security management.
In order to ensure the security of computer network more effectively, people should increase the security management of computer network while using technology to solve network security problems. Network management is different from enterprise entity management.
3. Conclusion