校园网网络安全分析与解决方案(国外英文资料).docVIP

  • 78
  • 0
  • 约1.88万字
  • 约 16页
  • 2017-06-08 发布于河南
  • 举报

校园网网络安全分析与解决方案(国外英文资料).doc

校园网网络安全分析与解决方案(国外英文资料)

校园网网络安全分析与解决方案(国外英文资料) Campus network security analysis and solution There are three security threats to computer networks: hardware security, software security, and data security. Hardware includes all kinds of equipment and components, connectors and cables in the network. Software includes network operating system, various drivers, communication software and other accessories; Data including the system configuration files, log files, user data, all kinds of important sensitive database and the communication between the two machines on the network content such as confidential information. A solution to network security of campus network Network virus prevention. In the network, the virus has developed from the storage medium (soft, hard, cd-rom) infection to network communication and E-mail infection. Therefore, preventing computer virus is an important part of computer network security. Network security isolation. The interconnection between the web and the Internet provides ample room for intentional, unintentional hackers or saboteurs. Therefore, effective security segregation between networks is essential. Network monitoring measures. In the case of not affecting the normal operation of the network, the increase of internal network monitoring mechanism can make maximum network resource protection. Software to solve network security vulnerabilities. For non-specialists to exactly understand and solve the server system and the whole network security flaws and security holes, so you need to use third party software to solve the potential safety hazard, and put forward the corresponding security solutions. Third-party software will include the following features: filtering out inappropriate content pages; Instant messaging use management; Streaming media download management; Blocking P2P peer-to-peer file sharing; Blocking Spyware Spyware package; Prevention of fraud sites and malicious code attacks; Providing complete online activity analysis reports; The complet

文档评论(0)

1亿VIP精品文档

相关文档