- 1、本文档共17页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
计算机网络技术1(Computer network technology 1)
计算机网络技术1(Computer network technology 1)
1. security attack form answer
There are four kinds of attacks in network security: interruption, interception, modification and forgery.
Interrupts are targeted by availability, which destroys system resources and makes the network unusable.
Interception is aimed at confidentiality, and unauthorized users access the system resources by some means.
Modification is done with integrity as an attack target, and unauthorized users access not only data but also data.
Forgery is the target of integrity, and unauthorized users insert forged data into the data that is normally transmitted.
2.VPN
VPN English full name is Virtual Private Network, the translation is virtual private network. VPN is defined as the creation of a temporary and secure connection through a public network (usually the Internet), a secure, stable tunnel through a chaotic public network. Using this tunnel, you can encrypt the data several times to achieve the purpose of secure use of the internet. Virtual private network is an extension of intranet. Virtual private network can help remote users, branches, business partners and suppliers with the companys internal network connection to establish credible security for economically and effectively connect to secure extranet VPN business partners and customers. VPN mainly adopts tunnel technology, encryption and decryption technology, key management technology and user and device identity authentication technology.
3.CRC
CRC calibration adopts polynomial encoding method. The processed data block can be viewed as a n order binary polynomial, consisting of. Such as a 8 bit binary numbercan be expressed as:. Multiplication and division of polynomial multiplication and division process and the general polynomial algebra of the same. The addition and subtraction of polynomials, 2 to modulo, add and subtract without dislocation, and logical XOR operation consistent.
When CRC is used, the sender and receiver gener
您可能关注的文档
- 蒙氏数学教学法(Montessori mathematics teaching method).doc
- 蒙台梭利教育(Montessori Education).doc
- 蒙特梭利教学法(The Montessori Method).doc
- 蒙自地产市场动态(Mengzi property market dynamics).doc
- 蒸菜食心菜谱(Steamed vegetable heart recipes).doc
- 蓝底高透petg的加工(Blue base high pass PETG processing).doc
- 葡萄的品种特性及栽培技术(Varietal characteristics and Cultivation Techniques of grape).doc
- 蔬菜标准园规范化栽培管理技术品种选择(Vegetable standard garden; standardized cultivation; management technique; variety selection).doc
- 薄壁绝缘汽车线生产(Auto production line of thin insulation).doc
- 蔬菜种类(Vegetable species).doc
最近下载
- 知识产权法智慧树知到期末考试答案章节答案2024年同济大学.docx VIP
- 临床医学教学模式创新与课堂互动设计.pptx
- 生猪屠宰兽医卫生检验人员理论考试题库资料及答案.pdf VIP
- 天津市静海区2024-2025学年高一下学期6月学生学业能力调研试题 地理试卷含答案.docx VIP
- 有限空间安全作业技术交底.docx VIP
- 消防设施操作员(中级监控方向)理论知识考试题库(含答案解析).pdf VIP
- 小学校园心理危机干预培训.pptx VIP
- 《内部控制与风险管理(第3版)》思考题和案例分析答案6-10章.docx VIP
- 军职在线-雷达原理-2023年春期末考试答案.docx VIP
- 佛山第六次人口普数据分析.doc VIP
文档评论(0)