資源描述:
《Computer Network Information Security And Protection Strategy》由會員上傳分享,免費在線閱讀,更多相關(guān)內(nèi)容在學(xué)術(shù)論文-天天文庫。
1、ComputerNetworkInformationSecurityAndProtectionStrategyTABLEOFCONTENSLetterofTransmittal………………………………………………………………iiExecutiveSummary….............................................................................................iii1.0Introduction……………………………………………………………………11.1Purpose…………
2、…………………………………………………………11.2Background………………………………………………………………..11.3Methodology……………………………………………………………....22.0ProcedureandFindings………………………………………….....................42.1HideIPaddress………………………………………………………….....42.2Sealedhackers"backdoor"………………………………………………...42.2.1Deleteunnecessarypro
3、tocols……………………………………..52.2.2Prohibittheestablishmentofairlink……………………………..52.2.3Turnoffunnecessaryservices.........................................................52.3DoIE'ssecuritysettings…………………………………………………...52.4Trojansguard……………………………………………………...............63.0Conclusions………………
4、……………………………………………………6Referenences……………………………………………………………………….7Appendix……………………………………………………………………………8LetterofTransmittalShanXi2013/6/10ProgramCommitteeNorthwooduniversity/JULC4000WhitingDriveMidland,MI,U.S.ADearProgramCommittee:Hereismyreport,ComputerNetworkInformationSecurityAndProt
5、ectionStrategy,whichyouaskedforonjuly12,2013.WiththerapiddevelopmentofInternettechnology,computernetworkaccessandexchangehasbecomethemostimportantmeansofinformationcommunication.Informationnetworkinvolvingnationalgovernments,military,culture,educationandmanyotherareas;Manyofthemaree
6、vensensitiveinformationisastatesecret,Soinevitablywillattack,Thenetworksystemfacesaseriousthreatandbecomeaserioussocialproblem.Thereportintroducednetworkinformationsecuritypolicies.Inthefollow,Iwilldetaildescription.Sincerely,iiExecutiveSummaryInrecentyears,availabilityofmoreemphasi
7、sonconvenienceandnonnetworktheneglectofthenetworksecurity.Whenthenetworkissuedtoconveyinformation,itisnotobvious.Inakeyoperation,suchasbanksandotherimportantbusiness.Whenthemainbusinessofthecompanyonthenetwork.Whenmoreandmoreactivitiesofgovernmentdepartmentsinthenetworkoperation,net
8、worksecurityhasbeco