With the continuous improvement of China's economic development level, computer technology has made rapid development and progress, and its appl
With the continuous improvement of China's economic development level, computer technology has made rapid development and progress, and its application in various fields is also increasing. People's life and production are inseparable from computer technology. The following is what I arranged for you for your reference.
The first chapter is "Thinking of Computer Network Security Prevention Technology"
With the rapid development of economy, society and modern science and technology, the network has become more and more close to people's lives. At the same time, computer network technology has been widely used in various fields of society, affecting people's daily production and life. Starting with computer network technology and its main characteristics, this paper analyzes and discusses the common network security threats; Combined with practice and my own understanding of computer network technology, this paper puts forward several network security prevention technologies, hoping to ensure the safe and smooth implementation of computer network through the elaboration of these technologies.
Keywords: computer network; Safety precautions; Technology; App application
The popularization and application of computer network technology has brought great convenience to people's life, production, work and entertainment. Because its realization is directly related to the information security and privacy of users, it is very necessary to do a good job in computer network security prevention technology. Effective computer network security methods and technologies can provide users with a safe network environment, ensure the security of information and privacy, and also play a positive role in promoting the development of computer network technology and maintaining social stability. In this regard, starting from the common network security threats, this paper puts forward effective network security prevention technology to promote the development of computer network technology in a safer and more scientific direction.
1 Discuss the importance of computer network security technology.
Computer network security is the security of computer network information. Only by maintaining the security of network information and doing a good job in network security prevention can we ensure the security and good implementation of network environment. Because computer network security has the characteristics of diversification and complexity, it is also necessary to have diversified characteristics when strengthening computer network security prevention technology. In recent years, with the rapid development of computer hackers, the attacks on computer networks have become more and more serious, and a large number of Trojan viruses spread on the network every day, posing a serious threat to users and enterprises. In addition, the computer network lacks the management of cheap pirated systems and pirated software, which leads to more serious information leakage and data destruction. Under the influence of many factors, it is very necessary to strengthen computer network security prevention technology.
Two common threats to network security
Computer network security itself is an interdisciplinary subject, and the object of its prevention is to carry out malicious attacks on some external illegal users in order to ensure network security. Because there are many factors threatening network security at present, it is difficult for computer network system to operate safely and normally. In this case, the author summarizes several security threats according to his understanding of network technology and practical experience, including:
1 cyber hacking. It refers to the behavior that some hackers tamper with the data of network system by cracking or destroying the program of the system. Mainly divided into two categories: one is destructive, mainly for stealing data and information in the network system. The other is: non-destructive, attacking network execution by interfering with the system. Generally speaking, hackers get it through e-mail attacks, system vulnerabilities, Trojan attacks and other means, which pose a great threat to computer network users.
Computer virus. As a major network threat, computer virus has the characteristics of concealment, infectivity and destructiveness. Once the virus enters the normal computer, it will slow down the execution speed of the whole network system, adversely affect the data reading, and even cause the data to be destroyed. Therefore, virus infection poses a great threat to computer users in computer network system.
3 system vulnerabilities. Refers to the defects or errors in logic design of application software or operating system software, which are exploited by criminals. Trojan horses and viruses are usually implanted into the network, attacking computer network systems, stealing data and information in the system, and even destroying the whole network system. In addition, under the influence of different prices, most users will choose pirated systems, which will easily lead to system loopholes and new loopholes in the implementation of computer network systems, which will eventually endanger the security of computer networks.
3 Application of computer network security technology
In view of the above-mentioned common network threats, as we all know, there are many factors that threaten the computer network system during its operation. The emergence and development of these viruses and vulnerabilities will make computer viruses constantly generate and spread, thus slowing down the execution speed of the system and bringing serious harm to data security and other privacy. In this regard, the author summarizes the relevant network security precautions through analysis and research, and its main technical performance is as follows:
3. 1 firewall technology
Firewall technology is the combination of software equipment and hardware equipment. It is a protective barrier built on the interface of internal and external networks, private networks and public networks, and has become a common technology to protect the security of computer networks. With the emergence and development of computer network security measures, the application of firewall technology can effectively block the access of external users to internal users, and ensure the safe implementation of computer networks by strengthening the management of internal networks, such as setting permissions. In addition, firewall technology itself has the ability to resist attacks, which can protect exposed users and strengthen the monitoring of network access during the execution of computer networks. In a word, firewall technology, as a network security technology, with its own characteristics of high transparency, simplicity and practicality, can ensure the security of computer network execution without modifying the original network application system.
3.2 Computer Network Access Control Technology
Network access control refers to the means by which the system limits users' ability to use data resources to their identities and predefined policy groups, and is applied to computer network systems. The specific implementation method is to use the router to control external access, and at the same time control access by setting permissions. Because this technology has the characteristics of integrity, systematicness and confidentiality, it is a key strategy to ensure network security by applying it to system administrators to control users' access to system resources such as directories, servers and files.
3.3 System Encryption Technology
Computer network encryption technology is one of the most commonly used security measures. It mainly uses technical means to transform important data into garbled code, and then restores it, that is, decodes it. The emergence of encryption technology is to ensure the security in the process of information dissemination. Encryption technology is mainly composed of two elements: algorithm and key. Algorithm is a step of combining common words and a series of numbers to generate incomprehensible ciphertext. A key is an algorithm used to encode and decode data. In order to ensure the security of network information transmission, it is generally realized by appropriate key encryption technology and management mechanism.
3.4 anti-virus technology
Anti-virus technology is actually a dynamic judgment technology, which aims to prevent computer viruses from infecting and destroying the system by adopting certain technical means. Its common measures include: boot zone protection, read-write control, system monitoring and so on. Therefore, computer operators are required to be familiar with various attributes of viruses, so as to choose the best preventive measures in the shortest time, reduce the harm caused by viruses or vulnerabilities to network systems, and thus ensure the safe execution of computer networks.
3.5 vulnerability repair technology
Vulnerability scanning is a security detection method, which detects the security of a specified computer system by scanning and other means, and finds the available vulnerabilities. As a network security technology, it can effectively avoid hacker attacks, cooperate with firewalls and detection systems, and ensure the security of computer network execution. Repair is to deal with the vulnerabilities and security risks existing in the detection process after vulnerability scanning and detection, so that hackers have no chance. Generally speaking, repair technology includes manual repair and automatic repair. Only by combining the two can we effectively curb the unsafe factors of the network system.
3.6 Backup tools and mapping technology
As one of the computer network security technologies, backup tools can protect data from damage and loss when the system hardware or storage medium fails. Backup is used for backup and backup, in order to prevent system operation error or system failure, resulting in data loss. However, the backup will be completed before the failure occurs. Only by making a comprehensive data backup in advance can we ensure that the data of the computer network will not be lost when the system fails. In addition, computer users can also use backup files and other means to avoid the loss or destruction of important data. Mapping technology is a cluster technology, which is applied to computer network security. By using software or other network devices, the hard disks of two servers are mapped, one of which is designated as the server and the other is the main server. In the process of network system implementation, mapping system can be used to ensure the security of the whole network.
4 conclusion
To sum up, the rapid development of computer network technology brings convenience to people's production, life and entertainment, while the corresponding hackers and threats are also gradually developing. Therefore, we should attach importance to computer network security, keep pace with the times, and constantly innovate technology to ensure that the implementation of computer networks is not infringed. This paper expounds the security measures of computer network from six aspects: firewall technology, access control technology, encryption technology, anti-virus technology, repair technology and backup and mirror technology. In addition, network technicians and users should be reminded to do a good job in network security prevention by using scientific and advanced prevention technologies, and continue to study and practice to maintain the computer network information security to the maximum extent.
References:
[1] South of Qian Yi. Computer Network Security Risk Analysis and Preventive Measures [J]. Computer Knowledge and Technology, 20 1 129
[2] Liu Ke. Network defense technology based on computer firewall security barrier [J]. Network Communication and Security, 20 136
[3] Dai Qin, Sean, Dong Haibing, et al. On computer network security technology and prevention [J]. China new technology and new products, 20 12 14.
[4] Wang Wei, Hu Shuai. Analysis and discussion on computer network security and prevention technology [J]. Network Communication and Security, 20 1435.
Chapter II "Computer Network Security and Virus Protection"
Abstract: Computer is an indispensable tool in modern times, and the network security of computer has a great influence on people's lives. Starting from the factors influencing the computer network security, this paper analyzes the concept and characteristics of network virus, and probes into the effective measures for computer network security and virus protection.
Keywords: computer; Network security; internet worm
1 Factors affecting computer network security
The main source of computer network security problems is the inevitable system and loopholes of the network itself. The following are the specific factors that affect computer network security.
1. 1 unauthorized access. Unauthorized access refers to the unauthorized use of network resources without the consent of the original user. People often use false identities or illegal attacks to avoid accessing authentication systems, forcibly entering network systems, illegally using network resources, and even maliciously stealing or modifying some information.
Illegal use of 1.2 information. The illegal use of information mainly includes the following forms: first, destroying information; The second is the leakage of information; The third is the transmission of illegal information flow. Among them, the information destruction means that the network intruder intercepts the resource package being uploaded or downloaded in the network, processes or modifies it, invalidates the resource package, or adds some beneficial information to himself, and returns the resource package with added information. Information leakage means that passive network intruders eavesdrop on some information through electromagnetic leakage or self-wiring [1], or screen or infer useful information by analyzing relevant information, which will not cause any damage to the information, but the information has lost its confidentiality. The transmission of illegal information flow means that users are allowing themselves to communicate with other users, but other types of communication will be prohibited.
1.3 Wrong or illegal use of network resources. Users do not set reasonable access rights or access control for resources, which leads to accidental loss or damage of resources and even the invasion of some harmful information. Or illegal users forcibly log in, using network resources causes resource consumption and damages the interests of the original users.
1.4 Influence of environment on network security. The influence of environment on network security can be divided into the influence of natural environment on network security and the influence of social environment on network security. For example, under the influence of bad weather, cables are damaged, resulting in network system paralysis and even computer damage. Furthermore, when people do the operation of generating electromagnetic radiation, the radiation will destroy the data transmitted by the network, which may be recorded by bad molecules, leading to information leakage.
1.5 software vulnerabilities. There are different softwares installed in the computer, and some softwares are flawed in design, which will damage the user's computer. Common software vulnerabilities mainly exist in the following parts: first, operating system, second, TCP/IP protocol, third, password setting, and fourth, database. The existence of vulnerabilities will give hackers a chance to attack, and once the virus invades, it will have serious consequences.
1.6 denial of service attack. Denial of service attacks will cause strong interference to the network service system, hinder the normal operation of the network service system, slow down the execution of programs, and gradually paralyze the whole system network, resulting in legal users not being able to use it normally, and even legal users cannot enter the computer network for related operations and obtain corresponding services.
2 the concept and characteristics of network virus
Network virus refers to a set of instruction integration codes written by some people using the inherent loopholes in computer software and hardware. There are four ways for network viruses to invade computers: one is code replacement; Second, embed the original code; Third, additional shell; Fourth, modify the system [2]. Although viruses invade in different ways, they will all cause damage to computers. Generally speaking, viruses have the following characteristics:
2. 1 Network virus has strong camouflage and reproductive attraction. With the maturity of computer technology, the harm of network virus is becoming more and more serious. It can not only tamper with computer programs, but also cause some damage or changes to data and information, thus posing a serious threat to the safety of computer users. Although the user's computer will install some anti-virus software, but the network virus has a strong camouflage and concealment, it is generally difficult to be found. Therefore, even if users use anti-virus software to prevent viruses, they cannot be removed, which will damage users' information and other data and files. In addition, computer viruses have strong reproductive ability, and network viruses can infect each other. In the process of virus expansion, it will cause certain infection to the whole user group. Once the virus mutates, it will be very destructive and aggressive.
2.2 Network viruses have a certain incubation period and have a strong attack power. After a computer is invaded by a virus, there is usually a certain incubation period. In a certain period of time, the virus will break out in an all-round way, posing a serious threat to the network security of computer users. Network viruses also have a strong attack power, mainly stealing users' information and then revealing some important information or files that need to be kept secret. Network viruses pose a serious threat to the security of computer users, so we should pay attention to the protection of computer viruses, and the most important thing is to protect the data security of computer users.
3 Effective measures for computer network security and virus protection
3. 1 prevention and protection software. Under normal circumstances, we will install anti-virus software in the computer, and sometimes even anti-black software. The purpose of installing these softwares is to prevent viruses from invading the computer. In addition, you must be vigilant when using U disk or CD-ROM. Never use disks or game disks with unknown sources. If you must use them, you should do a good job in antivirus cleaning up these disks. Also, don't download software from some unreliable websites, because these softwares are likely to carry viruses, which will cause serious damage to your computer after installation. Also, don't open or browse emails or web pages of unknown origin at will, because these emails or web pages are likely to contain malicious code. Finally, it is necessary to form regular backups or updates of important files.
3.2 Establishment of security module. We can use the network access function module as the first control protection layer of the network [3]. Specifically, the function module should restrict the users who use the network, limit the use time of users, and establish a blacklist to record illegal users. At the same time, through the establishment of an intelligent network log system, the function of the system is to automatically record the user's progress or usage. With the establishment of this system, we can find out whether there is a virus invading the computer.
3.3 Ensure the safety of transmission lines. In order to ensure the safety of transmission lines, we can protect them by burying them underground or taking other protective measures. This ensures the safety of the transmission line, but also ensures that the transmission line is far away from radiation, so as to reduce the problem of data loss or information error caused by electromagnetic interference. Also, put the line concentrator in a position that can be monitored to prevent the line from being connected externally. Then there is the need to check the connected ports to prevent eavesdropping.
3.4 Network encryption. We protect important data specially, for example, by setting encryption algorithm or key as protection. When setting the password, it is necessary to ensure the difficulty of the password and not to touch the user's personal information. The methods of network encryption include link encryption, end-to-end encryption and node encryption.
3.5 Access control. On the basis of authenticating users, control users' rights. Authentication refers to lifting the relevant restrictions on user services after the user has passed authentication, thus supporting access control. The storage matrix can be restricted in different ways, such as setting important files as read-only, write-only or modifiable, that is, restricting the storage matrix.
3.6 Adopt the identification mechanism. Authentication is mainly to identify the identity of users by identifying messages or digital signatures, and to grant users rights so that users can obtain corresponding services. After the certification of both parties, the dangerous components were eliminated and the identity tests of both parties were successfully carried out.
4 conclusion
Computers bring you a lot of convenience, but also bring you a lot of risks, so it is very necessary and important to pay attention to computer network security and prevent network viruses.
refer to
Xu Yongmei. Computer Network Security and Virus Protection [J]. Information Security and Technology, 20 12, 6:32-33, 47.
[2] Han Deqing. Computer Network Security and Virus Protection [J]. China Hi-tech Enterprise, 20 13, 26:36-37.
[3] Zhang Cheng. Application of virus protection technology in network security [J]. Computer Knowledge and Technology, 20 15, 12:62-63.
Chapter III "Computer Network Security Protection Measures"
The development of computer internet technology has brought great convenience to life and work, and it is an indispensable resource in today's society. However, due to its sharing and openness, it is vulnerable to various viruses and malicious software attacks, which leads to the leakage of data and information or the destruction of the system, seriously endangering the security of computer networks. Therefore, it is very important to study and discuss these problems and build a secure network system. This paper analyzes the security problems existing in the computer network, and puts forward relevant security precautions.
Keywords computer; Network; Safety protection
1 Overview of Computer Network Security
Computer network security means that the information network itself and the information data collected, processed, stored and transmitted are not intentionally or unintentionally disclosed, tampered with, destroyed or illegally identified and controlled, so as to ensure the availability, confidentiality, integrity and controllability of information. Computer network security is not only the security of computer network itself, such as hardware security, software security and related confidential data security, but also to ensure the security of network information from malicious attacks or destruction. Computer network security can be divided into physical, network, system, communication, data and other levels of information security from the inside out. The hidden dangers of computer networks will have a negative impact on people's lives, even bring economic losses and even threaten national security. Therefore, it is necessary to fully understand the security problems of computer networks and formulate corresponding preventive measures to solve them.
2 computer network security issues
2. 1 natural disaster threat
Computer network consists of hardware and software. Natural disasters mainly destroy hardware equipment, such as electromagnetic radiation interference, natural aging of network equipment, insect and mouse bites, fires, etc., which will directly or indirectly lead to computer network damage or abnormal use, and affect the storage and exchange of network data and information.
2.2 Unauthorized access
This means that some people with computer programming and debugging skills, using the mastered technology, illegally gain access to computer networks or files, invade the network without authorization and authorization, and illegally obtain relevant information. This kind of illegal intrusion is based on obtaining system storage rights and reading and writing rights, with the purpose of maliciously stealing and destroying relevant information.
2.3 virus transmission
Computer viruses spread through networks and hardware devices, or through the Internet, or through local area networks. Users may be infected with viruses when surfing the Internet, downloading software and playing games. When the computer virus spreads through the local area network, it will automatically infect the receiver by infecting the data transmitted by the local area network, thus causing the whole local area network to fall into an inoperable state. Computer viruses can spread through hard disk, floppy disk, CD, USB flash drive and other hardware. Viruses can copy the computer's own resources, not only destroy the computer's data and information, but also release them into the network, causing more serious consequences.
2.4 Backdoors and Trojans
Backdoor is a common technology for hackers to invade computer networks, which can be used to invade computer systems, so that administrators can't prevent growers from entering the system again. Trojan horse, also known as Trojan horse, is a hacker tool based on remote control. If this Trojan horse program is installed on the computer, the hacker can command the server program to control the computer.
3 computer network security protection measures
3. 1 firewall technology
A firewall is a kind of software located between a computer and a network. Installing this software in the computer can scan and filter all the data and information entering and leaving the computer, filter out some attacks and prevent toxic programs from being executed in the calculation. Secondly, using firewall technology can also close some unnecessary ports, prohibit data and information from flowing out of specific ports, and block Trojan attacks. Finally, for some visits from abnormal sites, the firewall can play a blocking role, thus preventing some unknown intrusion communications and protecting the security of the network to the maximum extent.
3.2 Do a good job of data backup.
Data backup is to copy one or more data information on the computer and store it in other safe places, such as mobile hard disk or network disk, so that even if the computer network is attacked and destroyed, the original data information will not be lost. This is one of the most direct and effective methods and measures to deal with computer network security, and it is also an important operation to maintain data integrity. The backup methods of data information include full backup, incremental backup and differential backup, and network managers should choose different operation methods according to different needs.
3.3 Intrusion detection technology
Computer network intrusion detection technology is to collect and analyze the relevant information such as computer operating system and application programs, so as to detect whether there is an intrusion, and cut off and alarm the intrusion. Computer network intrusion detection technology does not need to filter data and information, so it will not affect the normal performance of the network. At present, there are two intrusion detection methods: anomaly detection and misuse detection. The former is to detect the abnormal behavior of computer network users and the abnormal use of computer network resources in order to find and point out illegal intrusion. The latter is to detect whether there is misuse to reduce illegal intrusion.
3.4 anti-virus technology
Virus prevention, virus detection and virus removal are three main technologies to prevent computer network viruses. First of all, virus prevention technology is to store the written program in the memory of the system in order to gain priority control over the system and detect and judge whether there is a virus in the system; Virus detection technology is to monitor the characteristics of the virus itself and the file itself, so as to judge whether the computer system has been infected with the virus; Virus removal technology is to identify and remove viruses by using various virus killing software.
3.5 encryption technology
Encryption technology is to process a file or data according to a certain algorithm, making it an unreadable code, which is also commonly known as "ciphertext". Only by inputting the key can the original content be displayed and read, thus protecting information and data from being illegally stolen and read. Encryption is one of the important means to protect system security, and the correct use of encryption technology can effectively ensure the security of information. An extension of encryption technology is called smart card technology, which is a key medium that authorizes users to hold the card and give it a password or password. The registered password of the network server can only read the information on the computer when the password or codon is received and consistent.
3.6 Strengthen the management of computer network use
The above aspects are computer network security protection measures put forward from the perspective of technical means. In addition to technical measures, we should also strengthen the standardized management of network users' behavior, such as not clicking on unknown links at will when using the network; Keep your computer password safe. Is it necessary to establish relevant rules and regulations and strengthen the internal? A href ='' target =' _ blank'> Cough and stamp your feet? Are you greedy? Jokes? What's the matter with you? What's the matter with you? Are you worried? Are you happy and lonely? /p & gt;
4 conclusion
Computer network technology has become an indispensable part of people's life, work, study and production. In order to ensure the security of computer network and avoid the losses caused by attacks, we must fully realize the problems existing in computer network security, take effective technical measures to protect and control it, and realize the integrity, confidentiality and reliability of computer information.
refer to
Chen Shuangshuang. Research and discussion on computer network security [J]. Science and Technology Information, 20 1 12: 15.
[2] Hu Chaoqing. Computer Network Security Problems and Countermeasures [J]. China Science and Technology Information, 20 14 10: 15.
[3] Xiong Fangfang. On computer network security problems and countermeasures [J]. Electronic World, 20 1202:25.
Related suggestions: