资源描述:
《Computer Network Information Security And Protection Strategy 计算机信息系统英文毕业论文》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、ComputerNetworkInformationSecurityAndProtectionStrategyPreparedbyJilinUniversity---LambtonCollegePreparedforProgramcommitteeNorthwoodUniversity/JilinUniversity---LambtonCollegeTABLEOFCONTENSLetterofTransmittal………………………………………………………………iiExecutiveSummary…..
2、...........................................................................................iii1.0Introduction……………………………………………………………………11.1Purpose……………………………………………………………………11.2Background………………………………………………………………..11.3Methodology……………………………………………………………....
3、22.0ProcedureandFindings………………………………………….....................42.1HideIPaddress………………………………………………………….....42.2Sealedhackers"backdoor"………………………………………………...42.2.1Deleteunnecessaryprotocols……………………………………..52.2.2Prohibittheestablishmentofairlink……………………………..5
4、2.2.3Turnoffunnecessaryservices.........................................................52.3DoIE'ssecuritysettings…………………………………………………...52.4Trojansguard……………………………………………………...............63.0Conclusions……………………………………………………………………6Referenences…………………………………
5、…………………………………….7Appendix……………………………………………………………………………8LetterofTransmittalShanXi2013/6/10ProgramCommitteeNorthwooduniversity/JULC4000WhitingDriveMidland,MI,U.S.ADearProgramCommittee:Hereismyreport,ComputerNetworkInformationSecurityAndProtectionStrategy,wh
6、ichyouaskedforonjuly12,2013.WiththerapiddevelopmentofInternettechnology,computernetworkaccessandexchangehasbecomethemostimportantmeansofinformationcommunication.Informationnetworkinvolvingnationalgovernments,military,culture,educationandmanyotherareas;Ma
7、nyofthemareevensensitiveinformationisastatesecret,Soinevitablywillattack,Thenetworksystemfacesaseriousthreatandbecomeaserioussocialproblem.Thereportintroducednetworkinformationsecuritypolicies.Inthefollow,Iwilldetaildescription.Sincerely,iiExecutiveSumma
8、ryInrecentyears,availabilityofmoreemphasisonconvenienceandnonnetworktheneglectofthenetworksecurity.Whenthenetworkissuedtoconveyinformation,itisnotobvious.Inakeyoperation,suchasbanksandotherimportantbusiness.Whenthemainbusi