信息安全法律法规论文推荐.docxVIP

  1. 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
  2. 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  3. 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
  4. 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
  5. 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们
  6. 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
  7. 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
信息安全法律法规论文推荐

计算机网络信息安全法律法规论文 班级:12gb物联1班 学号05 姓名:薛 瑞摘要:网络电子商务在不断发展的同时。信息安全问题也显得愈为突出。作为保证信息安全重要手段之一的加密技术也扮演着越来越重要的角色。本文首先论述了网络信息安全的内涵,诠释了网络安全和网络黑客的含义,阐述了建立网络安全体系的重要性和目标。然后对计算机网络安全存在的问题和影响安全问题的因素进行了分析并举出了几种常见的网络攻击和应对计策。最后对网络安全防御体系进行了探讨,详细解释了防火墙技术、加密技术和生物识别技术。关键字:防御管理 病毒 防火墙 加密 识别 信息技术 法律法规目 录一、前言······················································4二、 计算机网络安全初步分析································5 2.1计算机网络安全和网络黑客的含义····························5 2.2网络安全的重要性··········································5 2.3网络安全定义及目标········································6 2.4网络安全的等级············································7三、计算机网络安全问题解析·································8 3.1计算机网络面临的问题······································8 3.2影响网络安全的几个方面····································10 3.2.1计算机病毒的内涵·····································10 3.2.2网络资源共享性因素···································11 3.2.3网络开放性因素·······································11 3.3常见的计算机网络攻击及其防范对策··························11四、网络安全策略·············································13 4.1物理安全策略物理安全策····································13 4.2政策保护策略··············································14五、网络安全防御管理········································14 5.1网络安全防御体系的探讨····································14 5.2防火墙技术················································15 5.2.1防火墙的分类·········································15 5.2.2防火墙的主要功能·····································15 5.2.3防火墙的优缺点·······································16 5.3数据加密技术··············································16 5.4生物识别技术··············································16 5.5入侵检测技术··············································17 5.6安全审计技术··············································17六、结束语····················································17一、前言网络安全已被信息社会的各个领域所重视。随着计算机网络的不断发展,全球信息化已成为人类发展的大趋势;给政府机构、企事业单位带来了革命性的改革。但由于计算机网络具有联结形式多样性、终端分布不均匀性和网络的开放性、互连性等特征,致使网络易受黑客、病毒、恶意软件和其他不轨的攻击,所以网上信息的安全和保密是一个至关重要的问题。对于军用的自动化指挥网络、C3I系统、银行和政府等传输敏感数据的计算机网络系统而言,其网上信息的安全和保密尤为重要。因此,上述的网络必须有足够强的安全措

文档评论(0)

aena45 + 关注
实名认证
文档贡献者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档