- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
论怎样防范计算机网络攻击(How to guard against computer network attack)
论怎样防范计算机网络攻击(How to guard against computer network attack)
How to guard against computer network attack
Abstract: with the development of modern computer network and information technology, network security has attracted more and more attention, and how to ensure the security of enterprise and personal network has become an important issue. This paper will discuss the current types of computer network attacks, and propose some ways to prevent network attacks.
Keywords: computer network attack; computer network security; computer network security with the development of modern computer network technology, computer network has gradually become an indispensable part of peoples life and work, it has changed peoples traditional work habits and rhythm of life. Today, people are more and more dependent on the network, and along with the gradual development and improvement of computer network technology, the information security protection of computer network has become more and more important. Some people out of interest demand or technology to show off and other reasons, the use of existing computer network vulnerabilities, often initiate all kinds of network attacks, network attacks are now common viruses, Trojan, phishing, overload attacks, vulnerabilities, these are serious harm to the safety of computer network. This article will discuss the types of common computer network attacks and the protective measures taken.
1 common network attacks
1.1: Trojan Trojan program can directly invade the users computer and destroy, it is often disguised as a program or game execution tool software to entice users, or add malicious code in a web page, the Trojan secretly downloaded to the user auto. Once these programs are executed, the Trojan will establish a connection between the remote computers, so that the remote computer can control the program of the local computer through the network, so as to control the purpose of the local computer. After controlling the local computer,
您可能关注的文档
- 解决光驱不读盘的技巧(Solve CD-ROM not read disk skills).doc
- 解决交换机端口不匹配导致局域网连接缓慢(Resolving a switch port mismatch causes a slow LAN connection).doc
- 解决孕妇幼儿成人便秘吉仕乐西梅汁(Solve pregnant adult children constipation Kyrgyzstan Shile prune juice).doc
- 解决净水器漏水问题保养和维护净水器(Solve the leakage of water purifier, maintain and maintain water purifier).doc
- 解决青年问题的我见(My view on solving youth problems).doc
- 解决软件和硬件接口问题的嵌入式系统(An embedded system for solving software and hardware interface issues).doc
- 解决麦克风没声音的问题(Solve the microphone without sound problems).doc
- 解剖考试(Anatomical examination).doc
- 解剖企业文化的幼稚病(Dissecting the infantile syndrome of corporate culture).doc
- 解密任正非的领导力(Deciphering Ren Zhengfei's leadership).doc
- 论小柴胡汤法及其变化(On the method and its change of Xiao Chaihu Decoction).doc
- 论我国原产地名称法之制定(On the formulation of Appellations of origin in China).doc
- 论我国财政政策与货币政策的协调运作(On the coordinated operation of fiscal policy and monetary policy in China).doc
- 论我国财政货币政策的协调配合(On the coordination of fiscal and monetary policies in China).doc
- 论文石斛性味归经的相关药理学研究进展(Advances in pharmacological research on the tropism of sex and taste of Dendrobium).doc
- 论新教传教士和戊戌维新派的关系(On the relationship between the Protestant missionaries and the reformers).doc
- 论文_膳食营养与美容(The _ dietary nutrition and beauty.).doc
- 论新时期电网企业成本控制(Cost control of power grid enterprises in the new era).doc
- 论李建成在建唐中的历史作用(On the historical role of Li Jiancheng in the construction of Tang Dynasty).doc
- 论星巴克接地气(On ground gas of Starbucks).doc
文档评论(0)