同学们提问关于“计算机网络安全论文_英语翻译要求是计算机网络安全方面的英语论文,翻译以...[英语]”的问题,52IJ师说平台通过网络上精心整理了以下关于“计算机网络安全论文_英语翻译要求是计算机网络安全方面的英语论文,翻译以...[英语]”的一些有用参考答案。请注意:文中所谈及的内容不代表本站的真正观点,也请不要相信各种联系方式。下面是本网所整理的“计算机网络安全论文_英语翻译要求是计算机网络安全方面的英语论文,翻译以...[英语]”的相关信息:
英语翻译要求是计算机网络安全方面的英语论文,翻译以...
科目:英语 关键词:计算机网络安全论文Computer network security and to guard against
Abstract: When mankind entered the 21st century information society, the network society of the time, China will establish a complete set of network security system, especially from the policy and law to establish China's own characteristics, network security system.
Key words: computer; network; security; prevent
In the information age, information can help groups or individuals so that they benefit from, the same information can also be used to pose a threat to them, caused damage. Therefore network security, including the composition of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious destruction of the attacks, network security not only the technical aspects, but also management issues, both complement each other, are indispensable.
First, the concept of computer network security
International Organization for Standardization of "computer security" is defined as: "To establish a data processing system and the adoption of technology and management of security protection, the protection of computer hardware, software, data is not due to accidental and malicious destruction of reasons, change and leakage." The above definition of computer security includes physical security and logical security of both the contents of the contents of the logic of security could be understood as we often say that the information security, information refers to the confidentiality, integrity and availability of protection, and network security Information security is the meaning of the extension, that network security is a network of information confidentiality, integrity and availability protection. Computer network security as the specific meaning of the user changes, the user is different on the network security awareness and requirements will be different. From the ordinary user's point of view, could only hope that personal privacy or confidential information transmission on the network be protected against eavesdropping, tampering and forgery; and network provider in addition to care about these network information security, we must also consider how to deal with sudden natural disasters, such as military strikes against the destruction of network hardware, as well as unusual in the network how to restore network communications, and maintain the continuity of network communications.
In essence, the network security, including the composition of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious attacks on the destruction of both the technical aspects of network security issues, there are management issues, the two sides complement each other, are indispensable. Man-made network intrusion and attacks makes network security is facing new challenges.
Second, computer network security status quo
Computer network security is the network hardware, software and data systems are protected from accidental or malicious destruction of reasons, alteration, disclosure, the system continuous, reliable, normal operation of network services without disruption. Computer and network technology has the complexity and diversity, makes computer and network security has become a need to continue to update and improve the area. At present, hackers method has been more than the type of computer virus, and many attacks are fatal. In the Internet network, because the Internet does not have the time and geographical constraints, whenever there is a means to generate new attacks, we can in a week around the world, these attacks means the use of network and system vulnerabilities to attack computer systems and resulting in network paralysis. Worms, backdoor (Back-doors), Rootkits, DOS (DenialofServices) and Sniffer (network monitor) is a familiar means of several hacker attacks. However, none of these attacks means they reflect the astonishing power of today become worse. These types of attacks means the new variant, with previous attacks appeared methods, more intelligent, targeted against Internet-based protocols and operating system level. From the Web process control procedures to the kernel-level Rootlets. Hackers practices escalating renovation, to the user's ability to guard against information security challenge.
Third, computer network security precautions
1, to strengthen the internal network management and the use of safety awareness among staff, many computer systems commonly used passwords to control access to system resources, which is anti-virus process, the most vulnerable and the most economical methods. Network administrator and terminal operator privileges in accordance with their responsibilities, choose a different password for the application data legitimate operation, to prevent unauthorized users to access the data and the use of network resources.
On the network, software installation and management is crucial, it is not only related to network maintenance and management efficiency and quality, but also to the network security. A good antivirus software can be easily installed within minutes to the organization each NT server can also be downloaded and spread to all the purpose of the machine by the network administrator set up and manage to focus, it will work with the operating system and other security is closely linked to become a part of network security management, and automatically provide the best network virus defensive measures. When the computer virus on-line resources applications attack, such as the virus exists in the information-sharing network of media, it is necessary to the security at the gateway, on the network front-end for antivirus.
2, network firewall technology
Is a kind of used to strengthen the network access control to prevent the external network users to illegal means to enter the external network through the internal network, access internal network resources and protect the internal network operating environment special for Network Interconnection Devices. It is between two or more networks such as packet transmission link in accordance with a certain degree of security strategy to implement the inspection, to determine whether the network communication between are allowed to, and monitor the network running. Although the firewall is to protect the network from an effective means of hacking, but there are obviously inadequate: through the firewall can not protect against outside attack other means, can not prevent defectors from the inside and inadvertent threats posed by users, but also can not completely prevent the transmission of the virus have been infected with the software or documents, and can not protect against data-driven attacks.
3, security encryption technology
Encryption technology for the global e-commerce to provide a guarantee, so that Internet-based electronic trading system has become possible, thus improving the symmetric encryption and asymmetric encryption technology is still the mainstream of the 21st century. Symmetric encryption to the conventional password-based technology, computing encryption and decryption operations use the same key. Asymmetric encryption, encryption key that is different from the decryption key, encryption keys are made public, anyone can use, only the decryption key to decrypt people know.
4, the network host operating system security and physical security measures
Network firewall as the first line of defense and can not fully protect the internal network, must be combined with other measures to improve the safety of the system level. After the firewall is based on the network host operating system security and physical security measures. In accordance with the level from low to high, namely, the physical security of the host system, the core operating system security, system security, application services security and file system security; At the same time, host security checks and bug fixes, as well as a backup safety system as a supplementary safety measures. These constitute the entire network system, the second line of defense, the main part of a breakthrough to prevent the firewall as well as attacks from within. System backup is the last line of defense network system, used to attack after the System Restore. The firewall and host security measures is the overall system security by auditing, intrusion detection and response processor constitute the overall safety inspection and response measures. It from the network system firewall, network host or even directly from the network link layer on the extraction of network status information, as input to the intrusion detection subsystem. Intrusion Detection System in accordance with certain rules to determine whether there is any invasion of the incident, if the invasion occurred, the emergency treatment measures, and generate a warning message. Moreover, the system's security audit also can be used as the future consequences of aggressive behavior and to deal with security policy on the system to improve sources of information.
In short, network security is a comprehensive issue, involving technology, management, use and many other aspects, including both its own information system security issues, there are physical and logical technical measures, a kind of technology can only solve the problem on the one hand, rather than a panacea. To this end the establishment of a network with Chinese characteristics, security system, the need for national policies and regulations to support and joint research and development group. Security and anti-security like two sides of contradictions, always pick-up, so the security industry is a future with the development of new technologies and the continuous development of industry.
References:
[1] Huang Yi-qiang, et al. On the software development needs analysis phase of the main tasks. Quarterly Journal of Sun Yat-sen University, 2002 (01).
[2] Hu Daoyuan. Computer LAN [M]. Beijing: Tsinghua University Press, 2001.
[3] Zhu Lisen, even Shougong. Computer Network Application Technology [M]. Beijing: Patent Literature Publishing House, 2001.
[4] Xie Xiren. Computer Networks (4th edition) [M]. Beijing: Publishing House of Electronics Industry, 2003.
[5]孙小刚, Han Dong, et al. Oriented software engineering, Visual C + + Network Programming [M]. Beijing: Tsinghua University Press, 2004,11.
仅供参考,请自借鉴.
希望对您有帮助.
补充:您可以随时找我,我会帮你翻译好发过去,随时欢迎您的咨询.
其他类似问题
问题1:英语翻译网络安全是指网络系统的硬件、软件及其系统中的数据受到保护,不因偶然的或者恶意的原因而遭受到破坏、更改、泄露,系统连续可靠正常地运行,网络服务不中断.网络安全从其本质
Network security is the network hardware,software and system data to be protected,not because of accidental or malicious reasons,suffered damage,alteration,disclosure,the system for normal operation and reliable,network services are not interrupted.Network security is the essence of their network information security.In the broad sense,all related to the network of information confidentiality,integrity,availability,authenticity and controllability of the related technology and theory are the network security research field.Network security is the one involved in computer science,network technology,communications technology,cryptography,information security technology,applied mathematics,number theory,information theory,such as the integrated multi-disciplinary subjects.
Network security as the specific meaning of "perspective" and change.For example:From the users (individuals,businesses,etc.) point of view,they want to involve the interests of personal privacy or commercial information transmission on the network by the confidentiality,integrity and authenticity protection,to avoid other people or against the use of wire-tapping,impersonation,tampering,repudiation,such as a means of violating the interests of users and privacy.
Key words:
Network security analysis,
Network encryption,
Information collection,
Internet Firewall
问题2:请帮我英文翻译: 本文分析了计算机系统与网络安全存在问题以及防范措施……由于小弟英文不好,在此请高手们帮我英文翻译下面一段话: 本文分析了计算机系统与网络安全存在的问题以及[英语科目]
This article has analyzed the computer system and the network security existence question as well as the measure.
问题3:英语翻译a paper about computer haraware not less than 1500 words[英语科目]
?
问题4:英语翻译Today’s Internet builds around the “narrow waist” of IP,which brings the elegance of diverse design above and below IP,but also makes it hard to change the IP layer to adapt for future requirements.这是计算机网络英文论文[英语科目]
这个文章已经有点修饰成分在里边,比严谨的科技论文更难翻译一些,或者说想要翻译得很贴切要难一些,不过别灰心,看得多了,练得多了,就好了.我觉得就这类文章,有时候是需要自己在理解的基础上做一些修饰的,不过修饰也不要过了头.
我试着翻译:
今天的互联网是围绕着网络协议(IP)这个蜂腰量体载衣来架构的,这个架构给针对网络协议上游或者下游工作的丰富多样的开发设计带来了雅致的创作成果,但是也使得改变网络协议的层次以便使之更适应未来开发设计的技术要求变得(更为)困难了.
希望帮到你一点,祝顺利.
问题5:哪里有有关计算机网络安全的英文参考文献?
嗯,到这里来看看吧~
美国国家网络安全联盟
信息安全英文资料库
关于无线网络安全问题的探讨(英文资料)
网络安全英文文献免费下载
- 评论列表(网友评论仅供网友表达个人看法,并不表明本站同意其观点或证实其描述)
-
