Traditional Culture Encyclopedia - Traditional customs - Computer network security paper

Computer network security paper

At present, the information security situation faced by computer network system is more and more severe. The following is my paper on computer network security for your reference.

Computer Network Security Problems-Common Computer Security Problems and Defense Measures

The application of computer plays an important role in the construction of production and life. In the information age, if there is no computer, it will lead to the disconnection between economy and technology. However, while computers bring convenience to people, they also bring some troubles. Computer security issues such as information leakage deserve our attention. Whether for individuals or countries, the security of information resources is conducive to future construction. This paper analyzes the security problems and defensive measures of computer hardware and software, and emphasizes the urgency of solving computer security problems.

Keywords: computer; Security issues; Preventive countermeasures; Software and hardware

The computer is one of the greatest inventions of mankind. In recent years, with the continuous innovation of technology, computers have been widely used in various industries. Computer software has provided great help for enterprise management and the application of digital technology. In people's lives, computer applications are everywhere. However, because of its open characteristics, computers have hidden dangers in network security. If it is not handled in time, it will bring trouble to people's lives and national security construction. Therefore, it is necessary to strengthen the safety construction of computers.

1 computer hardware security problems and preventive measures

1. 1 chip security

A computer is composed of chips, mainframes, graphics cards and other hardware. At present, there are many computer brands on the market, and the computer technology and high-tech level abroad are also relatively advanced. In some high-end talents and enterprises in China, there are many groups that use imported computers. In computer hardware, such as the use of chips, there are many security risks. In hardware facilities such as chips, some foreign technicians have implanted more viruses and instructions, which can invade users' computer programs, leading to the disclosure of personal data, enterprise information and even national construction information, and even the paralysis of computer information systems due to viruses carried, seriously affecting personal safety and national security. In addition, some network cards and graphics cards will also carry Trojans. Some computer enthusiasts like to buy their own computer hardware for assembly. If they don't buy in a secure place, it is easy to cause information security problems of computer hardware. After some interference programs are activated, it will bring serious consequences to the computer and affect the safe use of enterprises and individuals.

1.2 computer electromagnetic wave information leakage problem

There is some radiation in the operation of the computer, and the radiation of this electromagnetic wave is essentially a kind of information storage. With the continuous development of economy and technology, some high-tech talents have conducted in-depth research on the development and utilization of computers. In the market environment, the corresponding preventive measures can't keep up with the related technologies of computer information plagiarists. By using related equipment, plagiarists can recover computer information through the frequency of electromagnetic waves. In addition, the more devices connected to a computer, the stronger its electromagnetic radiation ability, and the easier it is to be accepted and copied by people. In addition to invisible electromagnetic waves, computer information will be leaked, and connecting computers through power cables and network cables will also cause security problems. This is mainly because the computer transmits information through electromagnetic waves, and electromagnetic signals are transmitted in both wires and network cables.

1.3 specific solutions

When solving the security problem of computer hardware, the relevant staff should take precautions against hardware components such as chips and electromagnetic wave radiation. In terms of hardware defense countermeasures, relevant personnel can make backup storage. For example, dual disks can be used to connect computers. When one storage hard disk has a program failure, it can be disconnected in time, and the other hard disk can continue to work, thus protecting information and materials without delaying the execution of work. On the issue of electromagnetic wave radiation, relevant technicians can connect shielding equipment to reduce the spread of electromagnetic waves, and can implement electromagnetic wave interference technology to interfere with the reception of plagiarists, resulting in the inability to recover information.

2 computer software network security issues and defense countermeasures

2. 1 computer software security issues

Information leakage in computer software is a serious problem, and it is also the main manifestation of computer security problems. Because there are many opportunities for computers to contact with software, videos, websites and documents, some malignant viruses and Trojan horses will invade with the application of computers, resulting in the destruction of information. For example, when computers don't use perfect security firewall and virus killing software, some stubborn viruses and Trojans will maliciously tamper with computer programs, resulting in the loss of information and materials and the tampering and destruction of important documents. Some computer security problems are caused by human factors. In some phishing websites, criminals collect personal information from users' computers through website registration and link clicking. After obtaining the relevant information, they will also forge the relevant information of users and implement online fraud. In addition, some secret-related enterprises still have problems such as computer eavesdropping and hacking, which are mainly done through related equipment and high-end technical operations. Relevant units should do a good job in information security maintenance.

2.2 Specific defensive measures

Encryption is the basic measure to realize computer information security, which mainly includes two aspects. First, symmetric encryption, that is, private key encryption, means that both the sender and the receiver of information use the same key to encrypt and decrypt files. Its main advantage is fast encryption and decryption, but it is suitable for small batch data processing. Secondly, asymmetric encryption, also known as public key encryption. Based on this encryption measure, one party uses the public key to publish and the other party uses the private key to save encryption and decryption. The process of information exchange is: Party A generates a pair of keys and discloses one of them to other parties as a public key. Party B who obtained the public key encrypts the information and sends it to Party A, and Party A decrypts the encrypted information with its own private key. In some confidential enterprises and personal computers, it is not enough to encrypt computer software to prevent information leakage. In order to achieve further security, we can protect ourselves through authentication technology. The so-called authentication technology is a double protection measure for the sender and receiver of information. Ensure that information is not lost during transmission. The types of this authentication technology are digital signature and digital certificate. Among them, the digital signature is an electronic signature, that is, a hash value is automatically generated in the text, then the hash value is encrypted in the form of a private key, and finally the digital signature is sent to the receiver; The receiver of the message first calculates the hash value from the received original message, and then decrypts the digital signature attached to the message with the public key of the sender; If the two hash values are the same, the receiver can confirm that the digital signature belongs to the sender.

3 Conclusion

The application of computer is based on technology, accordingly, in the preventive countermeasures of security problems, we should also discuss it from the technical aspect. Relevant technicians should analyze the causes of information security problems in detail, focus on information security caused by electromagnetic radiation and software networks, strengthen the application of electromagnetic shielding technology and key encryption technology, publicize the importance of computer security construction in daily life and production, popularize related technologies, and rely on the strength of the people to promote the implementation of computer network security.

refer to

[1] D. Common problems in computer security and countermeasures [J]. China New Communication, 20 15, (6): 33.

Analysis of data encryption technology in computer security

With the continuous development of social economy and science and technology, computer technology has been widely used in national defense, medical care, education, banking, industry and other industries. But there are advantages and disadvantages, and computer technology also has many disadvantages. Among them, the convenience of the network does bring great convenience to people's office and daily life, but the security of network data is still questioned by people, and similar cases emerge one after another, such as bank cards and personal information being leaked when the bank database is conquered, resulting in great losses of personal property. Therefore, it is imperative to strengthen the application of data encryption technology in computer security. This paper briefly analyzes the present situation, concept classification and application of data encryption technology in computer security.

Keywords: computer security; Data encryption technology; App application

First, the development status of data encryption technology in computer security

In today's computer operating system field, Microsoft is basically dominant, which is not conducive to computer data security, especially in national defense. Therefore, China is also actively developing its own Kirin system. Although there are still huge differences with foreign computer operating systems, this is a must. Once the more important national defense information is mastered by the conspirators, it will cause great losses to the national property security. Microsoft's wind, S operating system is accepted by the general public because of its simple operation and complete functions. However, this has also led to many hackers constantly attacking this single system. In this process, hackers constantly look for system vulnerabilities and use this vulnerability to attack. Subsequently, Microsoft will shield and fix these vulnerabilities, which is why Microsoft's operating system needs to be constantly updated. As we all know, the funnel of operating system can never be repaired, so the data encryption technology in computer security needs to be accelerated. Because of the benefits, many hackers are willing to take great risks to steal data, and even this behavior has become team and professional, which has brought great trouble to the development of computers. On the one hand, we have entered an Internet cloud era, and a large amount of information is spread and leaked through the Internet. These technologies also have huge security risks in the process of dissemination. If some important information is intercepted and released by a concerned person, such as personal bank card account password, ID number, home address and other hidden information, it will bring great hidden dangers to personal property and life safety. Therefore, the data encryption technology in computer security has attracted many people's attention, especially its application in data transmission protocols, which should be strengthened at this stage.

Second, the analysis of data encryption technology in computer security

In most computer security data encryption technologies, a piece of text or data is compiled into the corresponding ciphertext by using cryptography related technologies, which makes it difficult for others to understand its true meaning. Unless the corresponding cancellation method is obtained, even if this information is obtained, it will not get its real information and become useless text, thus achieving the effect of encrypting information and ensuring the key and core of computer information security. Generally, traditional encryption methods include permutation table algorithm, improved permutation table algorithm, cyclic shift operation algorithm and cyclic check algorithm. Among them, the permutation table algorithm is the simplest algorithm among these methods. It shifts every word in a piece of data in the same amount according to the corresponding permutation table to form an encrypted file, which is generally used for confidential files. When reading these encrypted files, it is only necessary to shift and recover according to the permutation table used for encryption. The improved permutation table algorithm is to strengthen the encryption degree of the file, and randomly transform each character of the file with two or more permutation tables. Of course, there are certain rules. Theoretically, the more substitution tables are used, the better the encryption effect of files. However, the higher the corresponding cost and technical requirements, the appropriate choice can be made according to the importance of the document. Cyclic shift operation encryption is an encryption method that can only be operated in a computer. Usually, the characters of the file are changed in the direction of the file by displacement calculation, and the encryption work is quickly completed by function loop. Although this encryption method is complicated, it has a good encryption effect and is applied in many fields. Cyclic check algorithm (CRC for short) is a high-order function check algorithm based on information such as computer or database transmission protocol, which is often encrypted during file transmission.

Third, the application of data encryption technology in computer security

Data encryption technology is widely used in computer security, such as network encryption based on database, file security based on software, business encryption based on e-commerce, private network encryption based on virtual network and so on. Among them, every application of data encryption technology in computer security has a very mature scheme and technology. Because a large number of data and files are stored in the computer network database, which is the direction that most hackers overcome, the encryption technology based on the network database is particularly important. At present, the network database management systems are all Microsoft's wind and Sllt systems, and there are some hidden dangers in system security. Therefore, the network database has strict requirements for user authentication and authority, especially for sensitive information and authority, special passwords and password identification are set up. This encryption method is mostly suitable for banks and other fields with huge data stock and important information. Encryption technology based on software encryption is very common in our daily activities. Antivirus software used in daily life generally has this function, which is mostly used to encrypt relatively private personal files. Guan Xige, the person who took the photos of the smash hit on the Internet, wouldn't have spread them online if he knew how to encrypt those photos with software. In addition, it is necessary to check the security of encryption soft armor when encrypting software. Nowadays, many computer viruses are specifically aimed at encryption software. Once it is invaded, it can not only be encrypted, but also reveal personal privacy to others. If it is used by criminals, it will cause great trouble to personal daily life. Encryption technology based on e-commerce has been greatly applied in today's business battlefield. Today's business competition is extremely fierce. Once the trade secrets are leaked, it will cause great losses to companies and enterprises. Nowadays, e-commerce has greatly promoted the development mode of business. Many important business contracts are signed online, which greatly improves the office efficiency of enterprises. But it also reflects the following network security issues. Therefore, when signing contracts and agreements on the internet, special transmission protocols and security certificates are used to ensure that the information of both parties to the contract is not known by other companies. Encryption technology based on e-commerce has become a powerful guarantee for trade secrets.

Four. Concluding remarks

To sum up, the improvement of data encryption technology in computer security is to prevent the data information in the computer from being conquered, but this is only a plan to slow down the war. Without computer information encryption technology, it can never be conquered, because with the development of computer encryption technology, the corresponding lifting technology is also developing. The security of computer data is also related to our daily behavior. Without installing unhealthy software, regular antivirus also plays a great role in protecting the security of our computer data.

References:

[1] research on the application value of Zhu data encryption technology in computer network security, Tian manufacturing automation, 20 12, 06:35-36

[2] Liu Yuping data encryption technology in the field of computer security analysis of information communication, 2012,02:160-161.

Computer Network Security Research on Computer Security and Firewall Technology

With the application of network technology, network security has become the main problem of today's development. To ensure the safety of computer operation, we should not only add new technologies to prevent some harmful factors from invading the computer, but also prevent the leakage of information inside the computer with the continuous reform and optimization of computer technology. This paper analyzes the main functions of firewall and studies the running mode of firewall technology in computer security.

Keywords computer; Security; Firewall technology

Network technology has promoted people's production and life and brought great convenience to people. However, there are some harmful factors in the application of network technology, especially the phenomenon of information leakage, which restricts people's positive development. The effective application of firewall technology in the network can not only promote the security of network information, reasonably distinguish the information inside and outside the network, but also strictly monitor the behavior to ensure the safety effect of information use.

1 Main functions of firewall

1. 1 can protect the network from attacks.

The effective use of firewall can protect the network from related phenomena. In network attacks, routing is the main form of attack. For example, using firewall technology can reduce the source attacks of ICMP redirection path and IP option path, and inform the administrator of the information in time. Therefore, the firewall can check and scan the information, which can not only prevent the unknown phenomenon of identity information, but also prevent the effective use of attack information.

1.2 can be said to access and access the network.

The main function of firewall is to effectively access network information and access information. In the process of using the firewall, you can record the information input in detail and make statistics on the network usage. If there are some suspicious information and illegal communication behavior, the firewall will judge the phenomenon and give an alarm. According to the effective analysis of this information, we can strengthen the understanding and understanding of firewall performance.

1.3 can prevent internal information from leaking.

The main function of firewall is to prevent internal information from leaking. The effective division of internal network information can protect information, promote the security effect of network information to a certain extent, and prevent information leakage. Because the intranet contains a lot of private information, these information can arouse the interest and enthusiasm of stakeholders in the process of utilization. Therefore, we should give full play to the correct use and scientific implementation of firewall, which can not only effectively prevent the problems encountered, but also effectively protect the owner's information, thus promoting the safety effect of implementation.

1.4 can centralize security optimization management.

The main function of firewall is to realize centralized security optimization management. The traditional network implementation measures are mainly the host computer, and the effective use of firewall in it can ensure the safety of ordinary computers and reduce costs. Therefore, in the TCP/IP protocol, using the firewall for protection and utilization can not only realize the enjoyment and development of each port, but also solve the security problem. If this form is not effectively protected by firewall, there will be great information leakage.

2 firewall technology in the effective use of computer security

2. 1 security service configuration

The security service isolation area is represented independently according to the system management cluster and the server cluster, resulting in an independent and secure service isolation area. This part is not only an important part of intranet, but also a relatively independent local area network. This division can mainly improve the data protection and safe operation on the server. According to the network address translation technology, relevant experts can map the host address of the intranet to ensure the effectiveness of IP address use. This development form can not only hide the IP address and structure of the intranet and ensure the security of the intranet structure, but also reduce the occupation of public IP address and investment cost. If you use border routers, you can increase the effective use of these devices, especially the effective use of firewall configuration. Although the original router has the function of firewall, the existing firewall realizes the effective connection with the internal network. For example, the public server in the security service isolation area is not implemented by a firewall, and can be directly connected with the border router. The effective combination of firewall and border router forms the form of double insurance and security protection. If the security service isolation zone is set between the firewall and the border router, the effective utilization of public server facilities can be strengthened.

2.2 Configure access policies

Configuring access policy is the most important security form in firewall. During setup, the access policy is not generated at will, but a complex and accurate expression. In this form of development, we should not only strengthen the practical application of computer technology at home and abroad, but also strengthen the knowledge and understanding of related knowledge to ensure its orderly development, so as to scientifically set the access strategy. In this case, it is mainly because the search form of firewall is carried out in a certain order, and the rules for its use should be set before use, which can improve the operating efficiency of firewall.

2.3 Log monitoring

Log monitoring is the main means of computer security. In traditional log management, managers do not choose information, and the contents reflected in the log are not neat enough. The content of the log is not only complicated, but also more. In this case, the utilization efficiency of the log is reduced. However, in the actual development, log monitoring has great advantages and certain application value, and it is the key information for the development of today's times. Under normal circumstances, the system alarm information in log monitoring has great recording value. These information should be optimized, then saved and backed up to ensure the safety of computer information and prevent the loss of information.

3 abstract

Firewall technology is a technical form of network security. Because of some unsafe factors in the network, it can't completely guarantee the security of the computer network. Therefore, in the actual use of firewall technology, we should ensure a scientific, holistic and comprehensive analysis, so as to ensure the safety effect of computer network operation.

refer to

Hou Liang. Research on firewall technology in computer network application [J]. User world. Cloud education, 20 14( 15):7-7.

[2] Feng Siyi. On computer firewall technology and its application [J]. Journal of Hebei University of Engineering (Social Science Edition), 2015 (1):13-114.

[3] Marley, Liang Hongjie. Research on the application of firewall technology in computer network security [J]. Computer Knowledge and Technology, 2014 (16): 3743-3745.

[4] Wang Liling. On Computer Security and Firewall Technology [J]. Computer Development and Application, 2012,25 (11): 67-69.

Computer network security paper recommendation;

1. Talking about the problems in computer network security management

2. Computer network security risks and prevention papers.

3. Computer network security papers.

4. Computer Network Security Papers

5. Computer Network Security and Prevention Papers

6. Computer network security graduation thesis model essay