基于网络的安全问题-computer science [2]
论文作者:www.51lunwen.org论文属性:硕士毕业论文 thesis登出时间:2013-03-20编辑:hynh1021点击率:4452
论文字数:12800论文编号:org201303181617595546语种:英语 English地区:中国价格:免费论文
关键词:计算机网络袭击
摘要:计算机网络将数据信息转换为模型是困难的,为了有效的保护信息,除非有解密密钥可以读取信息。加密技术,包括算法和密钥。算法是纯文本(或者可以理解的信息)和一串数字(密钥)结合,产生不可理解的密文的一步。密钥是用来对数据进行编码和解码算法。为了安全性和保密性,可以通过适当的密钥加密技术和管理机制,确保信息安全与通信网络。
age of the firewall include: can be used as the focus of network security policy. Firewall can be used as network traffic congestion points. Information on all incoming and outgoing network must pass through the firewall. Firewall will be a trusted private network and an untrusted public network isolated from the risk ranges from narrow to comprise the entire internal network firewall system, one or several hosts. Resulting in the formation of the structure of a control center, greatly enhanced network security, and simplified network management. Intrusion detection system based on testing different methods can be divided into two categories: anomaly and misuse. To sum up, firewall and IDS functions can be formed in the complementary relationship. This combination of dynamic technology than in the past a single or static technologies have made great improvement. The network's defensive security capabilities greatly enhanced. The linkage between firewall and IDS can be a good play to the advantages of both play down their own shortcomings, so that a more robust defense system of the wall. In the next area of network security, dynamic technology and static technology, the development of linkage will have a huge market, and space. Network security is a major systems engineering, in addition to outside the firewall and intrusion detection systems also include anti-virus technology and encryption technology. Anti-virus technology is to find and remove computer virus technology. The principle is embedded in the anti-virus scanner virus signature engines. Then according to the virus signature database to compare style killing. Encryption key information is hidden to prevent tampering or the information to prevent illegal use of information and conversion data functions or methods. It is the data information is converted to a difficult interpretation of the model to protect information, unless there are decryption key can read the information. Encryption technology, including algorithm and key. Algorithm is the plain text (or can understand the information) and a string of numbers (key) combination, resulting in incomprehensible ciphertext step. The key is used for data encoding and decoding algorithm. I
https://www.51lunwen.org/ n the security and confidentiality, you can through appropriate key encryption technology and management mechanisms to ensure the security of information and communication network.
本论文由英语论文网提供整理,提供论文代写,英语论文代写,代写论文,代写英语论文,代写留学生论文,代写英文论文,留学生论文代写相关核心关键词搜索。