Current location - Quotes Website - Signature design - Selected Computer Network Security Graduation Thesis Samples
Selected Computer Network Security Graduation Thesis Samples

With the rapid development of today's computer technology, people are paying more and more attention to the security issues of computer networks. The following is a computer network security graduation thesis that I recommend for everyone’s reference.

Computer Network Security Graduation Thesis Part 1: "Challenges Facing Computer Security at the Current Stage"

Abstract With the progress and development of modern science and technology, modern information technology has gradually become more widely used Applications bring convenience and speed to people's lives and work. At the same time, computer security issues directly affect the information security issues of computer users. This article analyzes and studies the existing problems of computer security in the new era.

Keywords new era; computer security issues and solutions; challenges

0 Introduction

As computers are used in various fields, the number of computer users is gradually increasing , which involves more and more important information being stored by computers, so solving and preventing computer security problems is an urgent task. Computers are susceptible to intrusions by hackers and viruses, which will not only affect the security of the computer, but also the security of user information, causing great harm to users. Therefore, computer security issues must be worthy of consideration and research.

1 Definition and components of computer security

Computer security is actually the technical and managerial security protection adopted for data processing systems to protect computer hardware, software, and data from Destroyed, altered or disclosed accidentally or maliciously. Computer security is mainly divided into two major sections, one is computer network, and the other is computer built-in system. Among them, computer networks have suffered the most data damage, so we must focus on computer network security issues. The computer's built-in system actually refers to the ability to ensure the normal operation of the computer and protect the safety of users during use, as well as the safety of the computer itself. Among them, whether the computer can run safely is closely related to the system installed on the computer; the user's safety issues during use are closely related to electromagnetic waves. Using the computer under the condition of strong electromagnetic waves can easily cause personnel safety issues; the security issues of the computer itself It refers to the environmental problems around the computer when it is used, and it is necessary to exclude the computer from being damaged by external objective factors. Computer networks are not restricted by regions. No matter where they are, computers may be attacked and violated by hackers. Because computer networks are connected internationally, computer network security is the responsibility of all computer users. After the discovery in recent years, the frequency of computer damage by hackers is increasing, so we must pay attention to computer security issues and avoid computer security problems.

2 Problems that need to be solved in computer security

2.1 Computer hardware security problems

At present, the problems that computers need to solve in the new era are mainly divided into four types: First, The chip problem means that some chips with great security risks are implanted into the core part of the computer. Once these chips are implanted into the computer, they can open the command to receive virus signals, thereby destroying the core content of the computer and achieving theft. The worst case scenario for obtaining data is to paralyze the entire computer. The second is electromagnetic leakage, because computers will radiate powerful electromagnetic waves when used. It is precisely because computers have this function when used that some criminals use this feature of computers to restore powerful electromagnetic waves, so that they can achieve The purpose of stealing information and data. Third, the hardware is damaged. The typical characteristics are hardware damage and the memory cannot be used normally, or the data backup function of the computer itself cannot be used normally, which results in the data being unable to be used and stored. Although the computer itself has hardening technology, the hardening technology still has some limitations, so it cannot better protect the computer hardware.

2.2 Computer network and software issues

With the popularity and promotion of computer networks, more and more people are using computer networks, but there are also many problems in computer networks and software. Typical manifestations are: information modification, identity theft, information theft, intentional destruction, etc.

Its main manifestations are: first, viruses appear on the computer, and some software comes with some viruses, and these viruses can steal the user's data and delete important information in the user's computer, etc.; second, Trojan or backdoor Trojan viruses, these Viruses are programs that appear to be legal on the surface, but actually cover up the facts on the surface, thereby secretly stealing user data through irregular means; third, being eavesdropped means that the user is obtained by criminals when transmitting information; fourth, Data and information tampering, after the data stored by the user is transmitted, criminals will tamper with the data; fifth, disguise, some criminals disguise themselves as legitimate users and enter the program to steal data; sixth, , interception service means that users are intercepted by criminals when transmitting data and information to the other party, and then intercept the information, which will cause the loss of information and the termination of the system. It can be seen that computer network security issues are threatened in various ways, and these ways of affecting security are becoming more and more hidden. This requires us to pay attention to computer security issues and find some solutions to these security issues. .

3 Strategies for Solving Computer Security Problems

3.1 Master the common sense of computer maintenance

To effectively protect computer security, computer users are required to have some computer protection skills. Basic common sense of security, to be a civilized computer user, in order to avoid computer security problems caused by inappropriate user operations, so that computers can play a greater role and serve people, you need to do the following: First, Pay attention to the temperature when the computer is in use. Normally it is between 10°C and 35°C. When using the computer in the summer, pay attention to the computer's heat dissipation and cooling, and keep the computer's air outlet clear; secondly, when the computer is not in use, Turn off the power of the computer and unplug the power cord to avoid burning the computer due to excessive current; thirdly, the computer cannot be used in a strong electromagnetic wave environment for a long time to protect the safety of the computer.

 3.2 Implanting authentication technology

Implanting authentication technology in the computer is to verify the identity of the user who sends the information and the identity of the user who receives the information. This technology is to avoid data tampering during information transmission, and is mainly divided into two types: digital signature and digital certificate. Therefore, the purpose of embedding this technology into computers is to improve the security of information transmission. A digital signature means that when the hash values ??of both parties sending and receiving information are consistent, the identity can be confirmed. The other means that both parties sending and receiving information must pass the password provided by the authoritative certificate before they can enter the system to extract information.

3.3 Be good at using firewalls

A firewall is a protective wall between the computer and the network. Whether the computer sends or receives information, it must pass through the firewall, and the firewall can control the information. Scan and eliminate some virus-containing information to prevent some information from spreading on the computer and damaging other software and hardware on the computer. This protects computer network security to a large extent, so users who use computers must install a firewall, so as to To achieve the purpose of protecting computer security.

3.4 Protect computer hardware security

Only by protecting computer hardware security can the computer run normally. At present, the computer hardware market is relatively chaotic. This requires consumers who choose computer hardware to choose hardware with a relatively high cost performance. If they really don’t know how to choose, they can ask some computer professionals for their opinions. This will ensure the quality of computer hardware and thereby improve computer hardware. Safety performance.

4 Conclusion

In summary, the existence of computer security problems threatens computer users’ information, and can cause serious irreparable losses. Therefore, we must pay attention to computer security protection. work, which requires support and efforts from many aspects to ensure computer security.

Computer network security graduation thesis part two: "Encryption technology management of computer security technology"

Abstract Since the information technology revolution, information technology with computer technology, Internet technology, and multimedia technology as the core Technology is developing rapidly. Computers have penetrated into people's daily production practices. It can be said that the Internet has become a necessity in society. Therefore, people have increasingly higher requirements for computer information security.

There are numerous software and computer technologies that can be used to ensure computer information security and prevent information leakage, but most users know little about computers. Therefore, computer encryption technology has become the easiest technology to popularize and has obvious effects. This article will focus on the application of computer encryption technology in computer security.

Keywords computer security; encryption technology; application

The continuous development of the information revolution and the continuous popularization of the computer Internet have provided people with many conveniences and also increased the use of personal information. Danger of misappropriation. Personal privacy security is in urgent need of protection. Personal information security is closely related to us. Common ones include game account theft, QQ account theft, computer file leakage, etc. Data encryption is the most important computer security technology. This article will discuss computer encryption technology to better promote the popularization of encryption technology, provide relevant advice to computer users, and ensure the security of personal information.

1 Computer encryption technology

1.1 The concept of computer encryption technology

Computer encryption technology is to develop a certain computer program language for originally disclosed files, data or information. , turning it into a piece of code that is unreadable under normal circumstances. Computer users can only operate algorithms correctly if they enter the correct code. There are also some popular encryption software to manage computer information. Software encryption is the use of cryptographic encryption methods. By setting the software to exchange information such as instruction codes and data in the software, it can prevent illegal users from executing through tracking. program to prevent unauthorized persons from illegally stealing, illegally copying, illegally using, rewriting, deleting, etc. Applying cryptography to information networks can protect users from being stolen or rewritten during network data transmission, and prevent electronic spoofing. Ensure the security of computer systems and network systems. Ensure the consistency, authenticity, integrity and confidentiality of user data information.

1.2 The Necessity of Computer Encryption

The Internet is an open world and a virtual world, so it is difficult to regulate and prone to numerous violations and illegal behaviors, making the online world become Not safe. How to ensure the security of data information in an open network system has become a problem that network information dissemination participants must face and solve. Computer technology is constantly developing and popularizing. More and more people have increased their understanding of computer knowledge. Some people can master the technology of cracking computer passwords or creating virus programs to destroy computers through self-study. For example, the "Panda Burning Incense" virus in 2007 spread through the Internet and quickly caused a large number of computer users to malfunction and lose computer data and information, causing significant economic losses. Faced with today's network status, it is understandable to choose data encryption to ensure the security of transmitted files. If computer users want to enjoy the convenience brought by the Internet and ensure the security of data information, only through data encryption technology can the requirements be met more effectively.

2 Application of Encryption Technology

2.1 Hardware Encryption

Hardware encryption mainly ensures the security of data transmission through computer hardware settings. Improve computer security by strengthening the computer firewall configuration. Computer firewall settings are relatively simple and convenient, and can play a great role in both local area networks and the Internet. Nowadays, most data exchange is carried out through U disk or USB and parallel port. To ensure that these data will not be lost from the USB and parallel ports, these data exchange interfaces need to be encrypted. Only data that matches the key can be read through these data interfaces. Filtering data through the key can not only prevent some computer data information from being stolen, but also prevent external data from posing threats to the computer.

 2.2 Disc encryption

Disc encryption is mainly to prevent piracy. In the past, a lot of data information was burned through disc burning software. If the disc data is encrypted through encryption technology, then Only through the key can the data information of the optical disc be read. And when reading the optical disc, a special software interface is required. It can only be viewed and browsed through the optical disc, but the optical disc cannot be copied, effectively preventing the data information of the optical disc from being copied.

However, with the continuous advancement of technology and the continuous updating of data storage devices, people use optical discs less and less due to their small capacity and inconvenience to carry, and optical disc encryption technology is used less and less.

 2.3 Compressed package encryption

Currently, the most widely used compression tools are ZIP and RAR. This is the most commonly used data encryption work. Both encryption tools come with it. There is a password setting function. Computer users can set a password and only need to obtain this password when decrypting the compressed package to read the data in the compressed package. This is similar to encryption during email transmission. This encryption technology is simpler and easier to understand, so it is more widely used. While encrypting these compressed packages, it can also reduce the space occupied by the compressed files and improve the utilization of computer space. On the other hand, computer users do not need to set multiple keys when setting keys. They can be managed through a key distribution center KDC platform. Data transfer between users in this platform will generate tags and The session is encrypted with a random password and the key is known only to each other.

 3 Conclusion

Computer encryption technology is relatively simple and convenient to use and can meet the needs of the general public, but it is still too simple for some advanced virus software. Only when cryptography technology is combined with information security technology, access control technology, network monitoring technology, etc. can it improve the capabilities of encryption technology. At the same time, it is also necessary to strengthen the supervision of the Internet and combat cyber crimes.

References

[1] Fan Qiusheng. Application of data encryption technology in computer security [J]. Coal Technology, 2013.

[2] Liu Yunzhi. A brief analysis of computer network security technology and its existing problems [J]. Information Systems Engineering, 2012.

[3] Li Dianxun. An analysis of the application of data encryption technology in computer network security [J] .China Science and Technology Expo, 2012

Computer Network Security Graduation Thesis Part Three: "Computer Network Information Security"

Abstract: Living in today's network information age, network information security issues have become a major concern. focus on. People are increasingly worried about whether the stored information will be damaged or stolen by others, whether there will be failures in the process of information processing, and whether the sent information is complete and whether it is accurately delivered to the other party. Information and network security are not only directly related to the reliability, availability, and data confidentiality of the entire communication process, but also problems involving user services are common. Computer network information security is facing unprecedented challenges. All sectors of society must not tolerate computer network information security issues. Neglect should attract great attention from all parties in society and take effective preventive and emergency measures to ensure information and network security and ensure the safe and smooth operation of computer networks.

Keywords: Computer network information security hacker intrusion

1 The concept of network information security

1.1 Information security

Prevent any attack on data Measures to carry out unauthorized access, or prevent intentional or unintentional leakage, damage, loss and other problems of information, so that the data is in a state or characteristic that is far away from danger and free from threats.

1.2 Network Security

Information security in a computer network environment.

2 Three major elements of network information security

(1) Integrity: Information is not destroyed by accidental or deliberate deletion, modification, forgery, disorder, replay, insertion, etc. characteristic. Information will not be modified or destroyed during storage or transmission, and there will be no loss or disorder of information packets.

(2) Confidentiality: Controlling the scope of information resource development, using data encryption, access control, and preventing computer electromagnetic leakage, is the most important feature.

(3) Availability: Authorized entities can access resources and services when needed. Availability means that the information system must be available whenever the user needs it, which means that the information system cannot refuse service. With the development of the information age, the concept and connotation of computer network information security are constantly evolving. Because the starting points and focuses are different, the conclusions drawn are also different. In addition, these concepts of information security may not fully cover all situations for a specific security application.

 3 Factors that undermine network security

 3.1 Human factors and natural disaster factors

 (1) Human factors refer to human intrusions and attacks, and damage to the normality of network systems run. Some "hackers" take advantage of the convenient conditions that computer viruses can spread in the network to destroy the computer systems of organizations or individuals, steal secret information and account passwords, and engage in various illegal and criminal activities.

 (2) Natural disasters Factors mainly refer to damage such as fire, flood, storm, lightning, earthquake, etc., as well as the impact of the environment (temperature, humidity, vibration, impact, pollution). The characteristics of such unsafe factors are: sudden, natural, and non-targeted. This type of insecurity poses the greatest threat to the integrity and availability of network information, but has less impact on the confidentiality of network information, because in general, physical damage will destroy the network information itself. Effective methods to prevent security risks are to take various protective measures, formulate security regulations, and back up data at any time.

(3) The unsafe factors that cause hidden dangers to the network system due to the security risks of the network itself include: Network. The vulnerability of the operating system, the vulnerability of database management system security, network resource sharing, computer viruses, etc.

 3.2 The vulnerability of the network operating system

The network operating system is. The most basic software for computer networks. It transfers files on the network, loads and installs programs, including executable files; it can create processes and even create and activate them remotely on nodes in the network; there are some daemon processes in the operating system. , are actually some system processes, which are always waiting for some conditions to appear; the operating system provides remote procedure call (RPC) services, but the security verification function provided is very limited; the operating system provides a network file system (NetworkFile System, referred to as NFS) service. The NFS system is a network file system based on RPC. The Daemon software in UNIX and Windows NT is actually some system processes. They are usually waiting for some conditions to appear, if the requirements are met. If conditions arise, this program will continue to run. This type of software is noticed and exploited by "hackers". What is even more worrying is that the Daemon software has the same permissions as the core layer software of the operating system.

3.3 Vulnerability of database management system security

Since the management of databases by database management systems (DBMS) is based on the concept of hierarchical management, it can be seen that the security of DBMS is in addition. , There are many interfaces between DBMS and network operating systems, and its security must be matched with the security of the operating system. This must be a congenital deficiency, and it is difficult to avoid it only by acquired prevention because DBMS runs on the operating system. Therefore, this security weakness cannot be overcome.

3.4 Maximum sharing of network resources

The biggest advantage of computer network systems is to realize maximum sharing of network system resources and hardware. , software, data and other resources. This kind of sharing is a double-edged sword with two sides. On the one hand, it not only brings convenience to users, but on the other hand, it also allows illegal users to steal information and destroy information. Information creates convenient conditions. Illegal users or hackers can carry out illegal means or illegal infringement through terminals or nodes

3.5 Computer network viruses

Due to the widespread application of computer networks in contemporary social work and life, computer viruses Attacks on computers and networks are also increasing day by day, and they are becoming more and more destructive. Once a virus strikes, it can impact memory, affect performance, modify data or delete files. Some viruses can even erase a hard drive or make it inaccessible, or even damage a computer's hardware. The greatest harm of viruses is to paralyze the entire network and make network resources inaccessible. It can be seen that the threat of computer viruses to computers and computer networks is very serious and cannot be ignored.

4 Solutions

4.1 Firewall technology

Firewall is a method used to strengthen access control between networks and prevent external network users from passing through the external network through illegal means. Enter the internal network, access internal network resources, and protect the internal network environment with special network interconnection equipment.

The control function of the firewall is mainly to control whether trusted addresses or untrusted addresses are allowed to enter. Among the various types of network security technologies used, the utilization rate of firewalls reaches the highest 76.5%. Firewalls are relatively cheap, easy to install, and can be upgraded online, so their usage ratio is relatively high. A firewall monitors communication data entering and exiting the network, allowing only safe, approved information to enter while blocking data that poses a threat to the enterprise.

4.2 Encryption technology of network information data

The emergence of encryption technology provides guarantee for global e-commerce and ensures the smooth and safe conduct of online electronic transactions. This shows that perfect symmetric encryption and asymmetric encryption technology remain the main tasks of the 21st century. Symmetric encryption is a conventional password-based technology in which the same key is used for encryption and decryption operations. Asymmetric encryption means that the encryption key is different from the decryption key. The encryption key is made public and can be used by anyone, but the decryption key is known only to the decryptor himself.

In modern society with rapid development of information technology, network security has always been a comprehensive topic. Maintaining network information security not only requires advanced science and technology, but also requires the support and cooperation of all sectors of society to create and maintain a good network environment. At the same time, it is also necessary to accelerate the research and innovation of network information security technical means, thereby making network information Resources can serve the majority of users more safely and reliably.

You may also like:

1. Appreciation of computer network security technology papers

2. Computer network security papers

3. Selected sample essays on computer network system security papers

4. Papers on computer network security

5. Papers on computer network information security