Current location - Quotes Website - Personality signature - Graduation thesis of computer network security technology
Graduation thesis of computer network security technology
With the rapid development of computer science and technology, computer security protection has become an important basic work of computer application system in enterprise production. The following is my graduation thesis on computer network security technology for your reference.

Computer Network Security Technology Graduation Thesis 1 Common Computer Security Problems and Defense Countermeasures

Firstly, this paper analyzes the causes of computer security problems from two aspects: hardware defects and software system vulnerabilities. Secondly, it focuses on the solutions to security problems and risk prevention methods in daily use, which can help reduce hidden dangers of computer equipment and help users complete tasks more efficiently.

Keywords: computer security; Network environment; Software security

1 Analysis of Common Computer Security Problems

1. 1 Hardware Security Analysis

First, the chip trap. When computer equipment runs in the network environment, the hidden dangers in its own hardware system will increase the probability of virus invasion. Common hardware problems are chip defects. The computer equipment using this chip itself does not have the ability to guard against risks. Although it can meet the needs of daily use, once it is connected to the network port, hacker attacks can be tracked. With the help of loopholes in the chip, it will enter the user's computer system and steal personal information. In severe cases, the vulnerability will be used to attack the user's computer equipment, resulting in a decline in the stability of the use stage. Second, electromagnetic leakage. It is also stealing users' personal information files, but unlike chip vulnerabilities, this method is realized by capturing electromagnetic transmission signals. Hackers steal users' personal information by writing programs, and the intercepted magnetic wave signals will also be translated through programs, allowing hackers to invade users' computer equipment. Computer maintenance personnel pay little attention to this security risk. Because the invasion principle is complex, security risks can be avoided by encrypting electromagnetic waves. However, the existing problem is that this safety protection channel has not been paid attention to and there is a lack of targeted management scheme. Third, hardware failure. In the network system, the computer is first attacked by the software system, and with the gradual expansion of virus invasion, it will also threaten the security of the hardware system. If the computer hardware itself is defective or damaged, the possibility of security risks is even greater. A large amount of data information is stored in the hardware, and the connection between the computer and the network port is also realized by searching information. Hardware failure will not only affect the safety of use, but also obviously slow down the speed of surfing the internet and cannot meet the needs of users. Compared with vulnerabilities in software systems, hardware problems are more difficult to repair and usually need to be replaced. If the damaged hardware continues to be used, it will affect the realization of computer functions.

Analysis of Security Problems of 1.2 Software

First, eavesdropping. After clarifying the common problems in hardware, according to the characteristics of equipment in use, the hidden dangers of software system need to be further studied. Once there is a loophole in the software system, the information in transmission will be attacked by hackers, and the information stolen by a third party will affect the stability of the computer network system, and the staff can't achieve the expected goal. Software problems are the most common in the stage of equipment use, and they are also the main factors threatening computer security. Second, the virus. When computer equipment running in the network environment is classified into security risk types, viruses account for the largest proportion. There are many kinds of viruses. It is common to destroy stored files. Once damaged, it is difficult to recover. There is also stealing the password of the user's important account, causing economic losses to the user. Third, fishing. The so-called fishing is just some black hands on the Internet. By making some pornographic or fake websites to obtain the relevant letters of netizens, it directly causes the disclosure of netizens' information, which seriously makes netizens pay a serious economic price for it. Fourth, camouflage tampering. The disguise of computer software security problems is mainly that criminals pretend to be legitimate users through various technical means and equipment, and then steal the relevant permissions of computers or accounts. The so-called tampering, mainly tampering with all kinds of information in the computer. In addition, the integrity of data will be seriously affected, and even the security of data information will be seriously affected. Fifth, the proliferation of spam destroys the network environment. Spam generally refers to e-mail that is forcibly sent to the user's mailbox without the user's permission. The flood of spam flooded the Internet. The spread of a large number of spam in the network infringes on the privacy of recipients and the empty space of personal mailboxes, occupies network bandwidth, causes server congestion, and seriously affects the transmission ability of information in the network.

2 computer security common problems defense countermeasures

2. 1 reinforcement technology. To improve the security of computer equipment, it is necessary to strengthen important files and reduce the possibility of being destroyed. In the process of use, the port connection will also be reinforced. Hardware reinforcement is an effective condition to ensure the safety of use. It should be carried out according to the parts where faults often occur during use. Line damage will affect the propagation speed of the network. Most of the damage is due to the aging of the line. Anti-corrosion coating on the surface, keeping the use environment dry, can reduce the probability of failure. On-site staff should strengthen the line safety management, and the work efficiency will be significantly improved after the hardware safety is guaranteed.

2.2 encryption technology. Setting a firewall and encrypting files can avoid the invasion of viruses. Computer operators can also set a separate password, and only those who know the password can use the device, which increases security and prevents important data stored in the device from being stolen by others. The application of encryption technology greatly improves the security of equipment operation, and can be combined with reinforcement technology without affecting the realization of other functions of computer equipment.

2.3 authentication technology. This technology is aimed at hacker virus tampering with network ports. When accessing the data in the system, you need to pass the authentication link. If the visitor information is abnormal, the system will also feed back this situation to improve the security of computer equipment. A common way to identify an account is to install a control in the computer, which can determine the standard access form. Digital signature, also known as electronic signature, mainly sends digital signature as a message to the receiver. For users, the public key of funds can be submitted to relevant departments in a safe and reliable way to obtain certificates, and further users have the legitimate rights and interests to disclose the certificates. Anyone who needs the user's public key can obtain this certificate, and the validity of the public key is confirmed by signing relevant legal agreements. For digital certificates, identify the identity information of each party in the transaction one by one, and provide methods to further verify the identity of each party, so that users can use these methods to effectively verify the identity of the other party.

2.4 put an end to spam. Spam has become another public hazard of computer network security. In order to prevent spam, we must first learn to protect our mailbox, avoid registering and using it at will on the Internet, and prevent the harassment of spam. Secondly, use the mail management functions in Outlook-—Express and Faxmail to filter spam and reject spam files. At present, many mailboxes have automatic reply function, and improper use of junk files will give you an opportunity. Users are advised to use the automatic reply function of mailboxes with caution. In addition, it is best not to open or reply to unknown or suspicious emails in the mailbox, which can also effectively avoid the harassment and destruction of junk files.

2.5 improve computer network security awareness. The security management of computer network needs to establish corresponding security management institutions, formulate job responsibilities, implement the security standards of network systems, and improve the management ability and professional level of computer network security. Do a good job of backup and encryption of important data at any time, strictly prohibit the leakage of important data, regularly maintain the safe operation of computer network system, improve users' awareness of healthy internet access, and nip in the bud. Through the exploration of this topic, we realize that computer security faces many common problems. In order to make the computer run normally and ensure the reliability and safety of people's life and work, it is extremely important to formulate effective solutions to common computer security problems. But this is a systematic work, which cannot be accomplished overnight and needs to be improved in many aspects. For example, reinforcement technology, encryption technology and authentication technology.

3 Conclusion

In addition to the application of many advanced technologies, it is also necessary to build a systematic computer management system and supervision mechanism to realize early warning and fully ensure the reliability and security of computer networks.

refer to

[1] Yang Changjian, Wang Jinzhou, Mi. Common problems in computer security and defense countermeasures [J]. Computer and Network, 20 12(7).

[2] D. Common problems in computer security and defense countermeasures [J]. China New Communication, 20 15(3).

Computer Network Security Technology Graduation Thesis Part II Computer Security Technology Protection Strategy

In the era of network popularization, computer network security has become particularly important. By analyzing the current network security problems, we can know that some security work needs to be improved, and put forward corresponding countermeasures for specific problems.

Keywords: computer; Network security; measure

1 computer network security

1. 1 computer network system security issues

XP, Vista, windows 7, windows 8 and other operating systems are indispensable platforms for computer networks, but these systems all have certain security risks, which make criminals illegally access computers, thus stealing important information of users or directly implanting virus-containing codes into the systems, resulting in system damage or paralysis and serious losses to users.

1.2 threats of computer viruses and trojans to network security

Nowadays, in the era when the Internet is ubiquitous, people can surf the Internet anytime and anywhere and do all kinds of things with the Internet. This openness of the network provides many opportunities for hackers to attack and make Trojan horses and viruses invade computers. Computer virus mainly spreads through network and hardware equipment, and its destructiveness lies in destroying computer data and hard disk, copying it at will in the computer system, and causing damage to the system. Viruses mainly spread on the Internet through forums or e-mails, and spread from local area networks to the whole network. Storage devices such as CD-ROM, floppy disk and U disk are the main ways to spread computer virus hardware. Today's viruses and Trojans are very disguised. They cheat users through various media carriers. As long as the user clicks on them, the program will be automatically downloaded and installed. What's more, the program invaded by the virus will read the user's contacts and send them viruses or deceptive information, causing a series of damage.

1.3 User identity has security risks.

People usually need accounts and passwords when using the Internet, and these accounts and passwords are set by themselves. Whether it is a network password, a login password or a payment password, users need to be careful. When setting passwords, try to choose complex passwords that are not easy to be released, so as to reduce the possibility of important information leaking out. Many hackers steal or tamper with important information resources by forging user identities.

2 the reality of computer network security

2. 1 Cybercrime is widespread.

In this era of internet popularization, we can see that computers are everywhere, and almost everyone communicates with the outside world through computers. Everyone is more or less an expert on computers, which means that everyone has the right and opportunity to use computers. At the same time, it also means that everyone may cause problems or losses to others through cyber crimes, such as stealing important information from others.

2.2 computer users lack awareness of network security

Computer network security awareness has two meanings for everyone. First, everyone should protect the information in his computer from being stolen by others, so when doing all kinds of things online at ordinary times, he should have safety awareness or measures; Second, in addition to ensuring their own network security, everyone should also ensure that they will not cause harm to others, let alone steal important information from others.

2.3 Hacking technology is very advanced.

Not everyone is the target of hacking, but they are often users with commercial value. In order to maximize their own interests, they often pretend to implant viruses in various ways, thus stealing important information from users and gaining benefits.

3 Measures to ensure computer network security

3. 1 Physical security measures of computer network

First of all, we must ensure the concealment and security of network lines, and ensure that the surrounding environment will not interfere or destroy the network due to natural or man-made reasons; Secondly, the quality of the computer's hard disk or equipment is good, and information leakage or damage cannot be caused by unqualified quality.

3.2 technology

The core of virtual private network technology is tunnel technology, which encrypts network data and transmits information to the other end through virtual channel, thus ensuring the security of data.

3.3 Improve computer intrusion detection technology and give full play to the role of firewall.

The main content of computer network security is hardware and software security, and the setting of firewall is mainly to escort by setting software firewall and hardware firewall. The working principle of firewall is to ensure the information security between intranet and extranet, and set which information can be accessed, prompted and intercepted directly. When the normal operating system of the computer is different from the set situation, the computer will automatically intercept it to remind the user to detect whether there is intrusion. A secure network environment is the premise to ensure the normal use of users and the fundamental guarantee for the safety of users' property.

3.4 Do a good job in computer virus prevention and control.

Computer viruses are written according to the defects of the software itself. This kind of virus is more advanced in programming and more difficult to identify and stop. Once the virus is implanted into the computer, it will copy the virus like a runaway wild horse, causing great interference and damage to the computer and unable to work normally. Computer viruses are very threatening, and their prevention must be foolproof. Generally speaking, viruses are mainly dealt with through three steps: prevention, detection and elimination. The most common computer virus prevention measure is to install anti-virus software. When the software finds a virus, it will kill it at the first time, and when the virus has not been implanted into the computer software and caused damage to the system, it will be killed in the cradle. Common methods of virus prevention and control include checksum, transplant inspection and vaccine program. The value-added summation method is to replace the original file with a virus-free backup file, correct the virus identification code in the source program, and generate a new identification code. Use workstation antivirus chip and StationLock network antivirus method.

3.5 Scan for vulnerabilities

No matter how much money and security technology each system spends, it is impossible to be completely immune from attacks, and there are more or less inevitable problems.

4 conclusion

Computer network security is related to the safety of every computer user. In order to create a safe network environment, everyone should establish safety awareness and adhere to civilized internet access.

Quote:

[1] Cai Yan. Social Network Security Problems and Solutions [J]. Electronic Technology and Software Engineering, 20 16.

[2] Zhang Kun, Hu Wentao and Xin Guo. Analysis of Computer Network Security [J]. Information Construction, 20 16.

Computer Network Security Technology Graduation Thesis Part III Computer Security Technology Analysis

With the continuous development of computer technology and network technology in China, the application of computers is gradually extensive, thus better promoting the development of various industries; However, while computer network technology brings convenience to my life, it also has certain limitations, such as the existence of loopholes and viruses, which will not only affect the normal use of computers, but also threaten people's lives and property safety; Based on computer security technology, this paper analyzes the security indicators and security protection countermeasures, and puts forward relevant opinions, hoping to play a positive role in promoting the development of science and technology.

Keywords computer; Network security

In recent years, the application of computer network is more and more extensive, and the factors affecting network security are gradually increasing, mainly from personnel operation, system loopholes, the existence of viruses and the design of firewalls, which affect the confidentiality and integrity of computer information; In this regard, the rational use of firewall, encryption technology, key technology and biometric technology can better ensure the normal application of network technology and computer systems and ensure that the public's property interests are not infringed.

First, computer security standards

The standard of computer network security mainly refers to the integrity of information, especially when using computer network technology to transmit information, the speed, quality and integrity of transmission should not be delayed and destroyed; Secondly, information must be available, and users must be authorized and confidential when using information; When users use information, the information is controlled by authorized institutions in time. Finally, when computer network technology is safe, it will provide a series of basis for network accidents; This is very necessary for computer network information security.

Second, the factors affecting computer network security

1, operating system. With the continuous research and development of network technology and the continuous expansion of technical application fields, the security of system operation is ignored, which leads to a series of security risks and system loopholes in computer network technology, which directly affects the security of computer information. However, with the enhancement of people's security awareness, firewall and other security schemes have been designed one after another. However, there are many security factors that will affect the operating system. First, there are loopholes in the security protection program itself, which makes it unable to play a good role in security protection.

2. virus. Network virus mainly refers to writing special instructions in computer programs; This instruction will not only destroy the database in the computer system, but also copy the information resources. At present, the common instructions mainly refer to a series of illegally invaded codes, which are attacked through loopholes in computer systems. However, these viruses are often hidden and undetected, spreading quickly and destructively. Once combined with hacker technology, they will play a role in controlling and destroying computers.

3. Operational problems. Although computers have become an essential tool for people to surf the Internet, there are very few users who can operate computer technology flexibly. Once the user makes a mistake, it will pose a great security threat. In addition, the user's lack of understanding of the application of protection technology makes the computer vulnerable to viruses or Trojan horses, which directly threatens the personal information and life and property safety of users.

Third, computer network security technology

1, firewall technology. Firewall is a network security system located between external network and internal network. Installing a firewall can effectively check data packets, and effectively remind users to filter and clean up in time according to the self-checking results to protect their computer systems.

2. Encryption technology. The research and development of encryption technology provides an effective guarantee for e-commerce and network information transaction; Encryption technology mainly includes symmetry and asymmetry, in which symmetric encryption technology mainly refers to providing the same key for encryption and decryption based on passwords; Asymmetric encryption technology is also based on passwords, but the encryption and decryption budgets use different keys, and the decryption key is only known by the parties themselves, but others don't.

3. Smart card technology. Hanging technology is similar to key technology, and it is also a group operation program based on key mode. After the user's smart card is given a specified password, when using the smart card, the user enters the same password as the password on the network server, so that the user can protect the user's information when using network technology. However, the application of this technology also has some limitations, because data encryption technology is not suitable for all servers or operating systems.

4. Biometric technology. At first, its biometric technology is the use and development of mechanical keys, then the application and development of digital keys, and finally it is optimized and developed into biometric technology, which uses the unique physical characteristics of human body to verify its identity when operating with network systems; Especially for the verification of physical characteristics such as fingerprint recognition and voice recognition, digital images of physical signs can be effectively obtained through peripherals and then input into the computer system. When users operate the system, it will play a very good role in protecting information and databases. With the continuous development of science and technology, China's biometric technology has developed from fingerprint to retina, bone and other identification technologies, thus better ensuring the integrity, confidentiality and security of information.

Fourth, summary.

To sum up, through the analysis of computer security technology, it is found that the protection of computer network technology is mainly to prevent viruses, Trojans, vulnerabilities and hackers. Combined with the complete standard of computer network, the firewall technology, encryption technology, smart card technology and biometric technology should be used reasonably. At the same time, the most important thing is to enhance computer users' awareness of network security protection. It is very necessary to operate the computer system correctly by flexibly applying network security protection technology.

refer to

Yang Chen. Computer network security technology in the information age [J]. Network security technology and application, 2014,01:108-109.

[2] Hu Danqiong. Computer network security technology J[]. Science and technology information, 20 14, Joe: 2 14.

[3] Wu Yanyan. Computer network information security technology [J]. Wireless Internet access technology, 20 12,: 1 124-25.

Recommended graduation thesis of computer network security technology;

1. computer network security graduation thesis model essay

2. Computer network security graduation thesis model essay

3. Computer security graduation thesis

4. Computer network security and prevention graduation thesis

5. Computer major graduation thesis: Analysis of network security technology.