The current information security and confidentiality situation faced by the computer network system is becoming more and more serious. The following is a computer network security issues paper that I have organized for you for your reference.
Computer Network Security Problems Paper I
Computer Security Common Problems and Defense Measures
Abstract: The application of computers plays an important role in the construction of production and life, and in the age of information technology, the absence of computers will result in the disconnection of economy and technology. However, the computer in bringing convenience to people at the same time, has created some trouble for people, information leakage and other computer security issues deserve our attention, both for individuals and for the country, information resources security is conducive to the construction of the future.
Keywords: computer; security problems; preventive measures; software and hardware
The computer is one of the greatest inventions of mankind, in recent years, with the continuous innovation of technology, the computer has been widely used in various industries, both in the management of enterprises and in the application of digital technology, the computer software provides a greater help in the lives of people. Computer applications are also ubiquitous. However, the computer due to its openness characteristics, there are hidden dangers in network security, if not dealt with in a timely manner, it will give people's lives and the national security construction to bring trouble, therefore, it is necessary to strengthen the security of the computer construction problems.
1 computer hardware security problems and preventive countermeasures
1.1 Chip security issues
The computer is composed of chips, hosts, graphics cards and other hardware. At present, there are more brands of computers on the market, foreign computer technology and high-tech level is more advanced, in some of our country's high-end talents and enterprises, the use of imported computers more groups. In computer hardware, such as in the use of chips there are more security risks. In the chip and other hardware facilities, some foreign technicians implanted more viruses and instructions, able to invade the user's computer programs, resulting in personal data, corporate information, and even national construction information leakage, and even due to the virus it carries, resulting in the paralysis of the computer information system, which seriously affects personal security and national security. In addition, in some network cards and graphics cards will also carry Trojan horses. Some computer hobbyists, like to buy their own computer hardware assembly, if not to the place of purchase of guaranteed, it is very easy to cause computer hardware information security problems, some interference programs through the activation of the computer will bring serious consequences, affecting the security of enterprises and individuals to use.
1.2 Computer electromagnetic wave information leakage problem
There is a certain amount of radiation in the operation of the computer, this electromagnetic wave radiation is essentially a storage of information. With the continuous development of economic and technological development, some highly skilled personnel for the development and utilization of computer research is very thorough, in the market environment, the corresponding preventive measures have not been able to catch up with the computer information plagiarism personnel related technology. Through the use of related equipment, plagiarizers are able to recover computer information through the frequency of electromagnetic waves. In addition, the more equipment connected to the computer, the stronger its electromagnetic wave radiation ability, the easier it is to be accepted and plagiarized. In addition to the invisible electromagnetic wave can cause computer information leakage, but also through the computer connected to the power cord and network cable to cause security problems. This is mainly because the computer in the transmission of information, are realized through electromagnetic waves, power lines and network cables in the electromagnetic signal propagation.
1.3 Specific solution measures
In solving the security problems of computer hardware, relevant workers have to chip and other hardware components and electromagnetic wave radiation to prevent two aspects. In the hardware defense countermeasures, relevant personnel can carry out backup storage. For example, can use double hard disk and computer connection, when a storage hard disk occurs program failure, can be disconnected in time, another hard disk can also continue to work, in the process of not delaying the implementation of the work, to complete the protection of information materials. In the electromagnetic radiation problem, the relevant technical personnel can be shielded equipment connection, reduce the spread of electromagnetic waves, and can be electromagnetic interference technology implementation, interference plagiarism plagiarists receive the situation, resulting in information data can not be recovered.
2 computer software network security problems and defense countermeasures
2.1 computer software security problems
Computer software information leakage problem is more serious, but also cause the main embodiment of computer security problems. Due to the computer in the use of more access to software, video, websites and documents, some malignant viruses and Trojan horses, etc. will be invaded with the application of the computer, resulting in the destruction of information materials. For example, when the computer does not have a perfect security firewall and virus checking software, some stubborn viruses and Trojan horses will maliciously tamper with the computer program, resulting in the loss of information, tampering and destruction of important documents. Among the security problems of computers, there are also some caused by human reasons. In some phishing websites, the illegal personnel through the website registration, link clicking, etc., the user's computer for personal information collection, get the relevant information, but also forged the user's relevant information, the implementation of network fraud and other behaviors. In addition, in some confidential enterprises, there are computer eavesdropping and hacking and other issues, which is mainly through the relevant equipment and high-end technical operations to complete, the relevant units to do a good job of maintaining information security.
2.2 Specific defense measures
Encryption processing is the basic measures to achieve computer information security, there are two main aspects. One, symmetric encryption processing, i.e., private key encryption, is that both the sender and receiver of information use the same key to encrypt files and decrypt files. Its main advantage is the speed of encryption and decryption, but this is suitable for small batch data processing. The second is asymmetric encryption, also known as public key encryption, based on such encryption measures to deal with the encryption and decryption, one party uses the public key to publish, the other party uses the private key to save. The process of information exchange is: party A generates a pair of keys and one of them as a public key to other parties to the transaction, get the public key of party B to use the key to encrypt the information and then send it to party A, party A and then decrypt the encrypted information with their own saved private key. In some confidential enterprises and personal computers, encryption to prevent information leakage of computer software is still far from enough, in order to achieve further security guarantees, can be defended through authentication technology. The so-called authentication technology is a double protection measure for information senders and receivers. Ensure that information will not be missing in the transmission process. The types of this authentication technology are digital signatures and digital certificates. One of the digital signature is also known as electronic signature, that is, in the text automatically generates a hash value, and then encrypts the hash value with a private key, and finally sends this digital signature to the receiver; the receiver of the message first calculates the hash value from the original message received, and then uses the sender's public key to decrypt the digital signature attached to the message; if the two hash values are the same, the If the two hash values are the same, then the receiver can confirm that the digital signature is that of the sender.
3 Conclusion
The application of computers is premised on technology, accordingly, in the prevention of security issues countermeasures, should also be explored from the technical aspects. Relevant technical personnel should analyze the causes of information security problems in a specific way, focus on information security caused by electromagnetic radiation and software networks, strengthen the use of electromagnetic shielding technology and key encryption technology, publicize the importance of computer security construction in life and production, popularize the relevant technology, and rely on the power of the people to promote the implementation of computer network security.
References
[1]Ding Chenhao. Computer security faces common problems and defense countermeasures discussion [J]. China New Communication, 2015,(6):33.
Computer Network Security Problems Essay Part IIAnalysis of Data Encryption Technology in Computer Security
Abstract: With the continuous development of socio-economic and science and technology, computer technology, regardless of whether it is in the field of national defense, medical treatment, education, industry and other industries The computer technology has been widely used in various fields such as defense, medical, education, banking, industry, etc. However, there must be disadvantages, computer technology also has many drawbacks. Among them, the convenience of the network does bring great convenience to people's office and daily life, but the security of data in the network is still being questioned by the people, and similar cases are endless, such as bank cards and personal information in the bank database was attacked when the leakage of personal property received a great loss, so it is imperative to strengthen the application of data encryption technology in computer security. This paper briefly analyzes the current situation of data encryption technology in computer security, the concept of classification and its application.
Keywords: computer security; data encryption technology; application
First, the development of data encryption technology in computer security
In the field of computer operating systems, basically, Microsoft is a dominant company, which is very unfavorable to the computer data security, especially in the national defense, so our country is also active in the research and development of their own Kirin system, although there are still some differences with foreign computer operating systems. Although there is still a huge difference with foreign computer operating systems, but this is a must-do work, once the more important national defense information by those who want the wrong war elements to grasp, will cause great losses to the national property security. Microsoft's wind, S operating system is accepted by the majority of people, because of its simple operation, full-featured, but this also led to a large number of hackers continue to attack this single system, in the process, hackers continue to find system vulnerabilities and use this vulnerability to attack, and then, Microsoft and then these vulnerabilities to block and patch, which is why Microsoft's operating system needs to be constantly updated. It is well known that the leakage of the operating system can never be repaired, so the data encryption technology in computer security needs to accelerate the development. Because of the problem of interest, many hackers are willing to take great risks to steal data, and even, this kind of behavior has appeared in the team and industry, the development of the computer has caused great trouble. From the other side, now into an Internet cloud era, many information is spread through the network and leakage, in the process of dissemination of these technologies there is also a huge security risks, some of the more important information if the person who has the intention to intercept and lift out, such as personal bank card account passwords, identity card numbers, home addresses and other more secret information, personal property and life safety will bring a great risk. Great potential danger to personal property and life safety. Therefore, data encryption technology in computer security has been emphasized by many people, especially in the application of data transmission protocols, belonging to the current stage should be strengthened.
Second, the analysis of data encryption technology in computer security
Most of the data encryption technology in computer security is the use of cryptography technology to compile a piece of text or data into a corresponding cipher text, into a text or data that is not easy for others to understand the true meaning of the text or data, unless you get the corresponding method of lifting the corresponding method, or else even if you get the information will not get the real information, become a piece of text or data that is not easy to understand the true meaning of the text or data. The real information, become a useless text, so as to achieve the effect of information encryption, to ensure that the key to computer information security and the core. Usually, traditional encryption methods include substitution table algorithm, improved substitution table algorithm, cyclic displacement operation algorithm and cyclic checksum algorithm. Among them, the substitution table algorithm is the simplest algorithm in these methods, is a piece of data in each word in accordance with the corresponding substitution table for equal displacement to form an encrypted file, which is generally used for the file is not confidential, in the encrypted file to decrypt only need to be encrypted in accordance with the substitution table used for the displacement of the conversion can be restored back. The improved substitution table algorithm is to strengthen the degree of file encryption, the use of two or more substitution table, each character of the file for random transformation, of course, there are certain rules to speak of, in the restoration or the use of the corresponding substitution table restoration, theoretically, the more the use of the substitution table, the better the encryption of the file, however, the corresponding cost and technical requirements, the higher, the more important according to the importance of the file. However, the corresponding cost and technical requirements are higher, which can be moderately selected according to the importance of the file. Cyclic displacement operation encryption is a kind of encryption means that can only be operated in the computer, usually the characters of the file through the displacement calculation to change its direction in the file and through a function cycle to quickly complete the encryption work, although this encryption method is more complex, but its encryption effect is better, and it has been applied in many fields. Cyclic checksum algorithm, referred to as CRC, is a computer or database based on transmission protocols and other information such as high-digit function checksum algorithm, mostly in the file transmission process of encryption.
Third, the application of data encryption technology in computer security
The application of data encryption technology in computer security is very broad, the application of more database-based network encryption, software-based file confidentiality, e-commerce-based business encryption, based on the virtual network of the private network encryption. In which, each of the computer security in the application of data encryption technology has a very mature program and technology. Because the computer network database stores a large amount of data and files, is the direction of most hackers, so, based on the network database encryption technology is particularly important. The current network database management system are in the Microsoft wind, Sllt system, there are certain hidden dangers in terms of system security, so the network database on the access to the user's identity verification and authority requirements and its strict, especially for the more sensitive information and authority to set up a special password and password recognition, this type of encryption method is more suitable for banks and other data stock is huge, the information is more important to the This type of encryption method is mostly applicable to banks and other large data stocks, information is more important areas. Encryption technology based on software encryption is more common in our daily activities. Everyday use of antivirus software will generally have this function, more for personal more private files for encryption, the network on the red-hot photos of the incident of the people GuanXiGuo if you know how to use the software to encrypt those photos will not be circulated to the network. In addition, in the software encryption to check the security of encryption software armor, now many computer viruses specifically for encryption software invasion, once invaded, not only did not play a role in encryption, but also personal privacy to others, if the use of lawless people, will be a great nuisance to the individual's daily life. Encryption technology based on e-commerce has been greatly applied in today's business battlefield. Today's business competition is extremely fierce, once the leakage of business secrets, it will cause huge losses to companies and enterprises. Today's e-commerce to increase the promotion of the development pattern of business, many important business contracts will be signed online, greatly improving the efficiency of the enterprise's office, however, the ensuing network security issues are also embodied, so, in the network to sign the contract and agreement are the use of specialized transmission protocols and security certificates to ensure that the contract between the two sides of the information will not be known by the other companies based on the e-commerce. Encryption technology has become a powerful guarantee of commercial confidentiality.
Fourth, the concluding remarks
To sum up, computer security in the data encryption technology to prevent the computer data and information to be attacked, but this is only a delaying tactic, there is no computer information encryption technology can never be attacked, because, in the development of computer technology encryption technology at the same time, with its corresponding lifting of the technology has also been constantly developing. The security of computer data is also related to our daily behavior, do not install unhealthy software, regular anti-virus also has a great role in protecting our computer data security.
References:
[1]Zhu Wenya Research on the application value of data encryption technology in computer network security Tian Manufacturing Automation,2012,06:35-36
[2]Liu Yuping Analysis of the application of data encryption technology in computer security Tian Information and Communication,2012,02:160-161
Computers Network Security Issues Paper IIIResearch on Computer Security and Firewall Technology
Keywords With the application of network technology, network security issues have become the main problem of today's development. Guarantee the security of computer operation, not only to increase the new technology to prevent some harmful factors invade the computer, but also with the continuous change and optimization of computer technology, to prevent the computer internal news leakage phenomenon. This paper analyzes the main functions of the firewall according to the firewall, and studies the operation of firewall technology in computer security.
Keywords: computer; security; firewall technology
Network technology promotes people's production and life, bringing greater convenience to people. However, network technology in the use of some harmful factors, especially the phenomenon of information leakage and other constraints on the positive development of people. Effective use of firewall technology in the network can not only promote the security of network information, can be reasonable distinction between internal and external information on the network, but also to perform strict monitoring behavior, to ensure that the information used to ensure the safety of the effect.
1 The main function of the firewall
1.1 Can protect the network from attacks
The effective use of firewalls can protect the network from attacks on related phenomena. In network attacks, routing is the main form of attack. Such as: ICMP redirection path and IP option path of the source route attack, the use of firewall technology can reduce the attack phenomenon, and can inform the administrator in a timely manner. Therefore, the firewall is able to gate and scan the information, not only to prevent the identity of the unknown phenomenon, but also to prevent the effective use of attack information.
1.2 can say that the network access and access
The main function of the firewall can be effective access to network information and information access. Firewall in the utilization process, can be a detailed record of information access, but also can be the use of the network statistics. If there are some suspicious information and illegal communication behavior, the firewall will judge its phenomenon and alarm it. According to the effective analysis of this information, can strengthen the knowledge and understanding of the firewall performance.
1.3 Can prevent the leakage of internal information
The main function of the firewall can prevent the leakage of internal information. The internal network information is effectively divided, can protect the information where it is located, and to a certain extent to promote the security effect of network information, in order to prevent the leakage of information. Because the intranet contains a large amount of private information, this information can arouse the interest as well as the enthusiasm of those concerned in the process of utilization. Therefore, the correct use of firewalls should be played as well as the scientific implementation, not only to effectively prevent the problems encountered, but also to effectively protect the owner's information, in order to promote the implementation of the security effect.
1.4 The ability to centralize security optimization management
The main function of the firewall can achieve centralized security optimization management. Traditional network implementation of the measures are mainly hosts, the effective use of firewalls in which can guarantee the security of ordinary computers and reduce costs. Therefore, in the TCP/IP protocol, the use of firewalls for protection and utilization, not only to achieve the development of each port **** enjoyment, but also to solve security problems. If the firewall is not utilized for effective protection in this form, there will be a greater leakage of information.
2 Effective use of firewall technology in computer security
2.1 Security Service Configuration
The security service isolation zone is based on the system management cluster, server cluster independent performance, and produces a kind of independent, secure service isolation zone. This section is not only an important component of the intranet, or a relatively independent LAN. This form of division can mainly improve the protection of data on the server as well as the safe operation. According to the network address translation technology, experts can map the host addresses of the intranet to ensure the validity of the use of IP addresses. This form of development not only hides the IP address and structure of the intranet to ensure the security of the intranet structure, but also reduces the possession of public IP addresses and lowers investment costs. If the border router is utilized, it can also increase the effective use of these devices, especially the effective use of firewall configuration. Although the original router has a firewall function, but the existing firewall to achieve an effective connection with the internal network. For example, the public servers in the security services isolation zone is not the use of firewalls to achieve, it can directly connect with the border router. Effective combination of firewalls and border routers, the formation of a double insurance form, the formation of a form of security protection, if the firewall as well as the border routers set up between the security services isolation zone, can strengthen the effective use of public server facilities.
2.2 Configuration access policy
Configuration access policy is the most important form of security in the firewall, access policy during the setup, is not randomly generated, but a complex and precise form of expression. In this form of development, should strengthen the practical application of computer technology internally and externally, but also to strengthen the knowledge and understanding of the relevant knowledge, and to ensure the orderly development thereof, so that the access policy will be set scientifically. In this case, mainly due to the firewall to find the form is in accordance with a certain order, to be used before the use of its use of the rules set up to be able to improve the efficiency of the operation of the firewall.
2.3 log monitoring
Log monitoring is the main means of computer security, managers in the traditional log management, and did not select the information, which logs embodied in the contents of the log is not neat enough, the log content is not only complex, but also the number is relatively large, in this case, reduces the efficiency of the utilization of logs. However, in the actual development, log monitoring has greater advantages, in which there is a certain application value, is the key information of the development of today's era. In general, the system alarm information in the log monitoring has a greater value of recording, optimize the selection of this information, and then save, backup, in order to ensure the security of computer information, to prevent the phenomenon of information loss.
3 Summary
Firewall technology is a form of network security technology, due to the existence of some insecurity in the network, fundamentally does not fully guarantee the safety of computer networks. Therefore, in the actual use of firewall technology, to ensure that the scientific, holistic and comprehensive analysis, so as to ensure the safety of computer network operation.
References
[1]Hou Liang. Research on firewall technology in the application of computer networks [J]. Networld. Cloud Education,2014(15):7-7.
[2]Feng Siyi. Test of computer firewall technology and its application[J]. Journal of Hebei Engineering University (Social Science Edition),2015(1):113-114.
[3]Ma Li,Liang Hongjie. Research on the application of firewall technology in computer network security[J]. Computer Knowledge and Technology,2014(16):3743-3745.
[4]Wang Liling. Introduction to computer security and firewall technology[J]. Computer Development and Application,2012,25(11):67-69.
Recommended essays on computer network security:
1. On the computer network security management in the problems of the paper
2. Computer network security risks and prevention of the paper
3. Computer network security prevention of the paper
4. Thesis on Computer Network Security
5. Thesis on Computer Network Security and Prevention
6. Sample Thesis on Computer Network Security