计算机网络安全英语论文及翻译求助

要求是计算机网络安全方面的英语论文,翻译以后字数要在5000以上
希望高手帮助
还需要翻译的,谢谢啊,帮人帮到底啊

Computer network security and to guard against

Abstract: When mankind entered the 21st century information society, the network society of the time, China will establish a complete set of network security system, especially from the policy and law to establish China's own characteristics, network security system.

Key words: computer; network; security; prevent

In the information age, information can help groups or individuals so that they benefit from, the same information can also be used to pose a threat to them, caused damage. Therefore network security, including the composition of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious destruction of the attacks, network security not only the technical aspects, but also management issues, both complement each other, are indispensable.

First, the concept of computer network security
International Organization for Standardization of "computer security" is defined as: "To establish a data processing system and the adoption of technology and management of security protection, the protection of computer hardware, software, data is not due to accidental and malicious destruction of reasons, change and leakage." The above definition of computer security includes physical security and logical security of both the contents of the contents of the logic of security could be understood as we often say that the information security, information refers to the confidentiality, integrity and availability of protection, and network security Information security is the meaning of the extension, that network security is a network of information confidentiality, integrity and availability protection. Computer network security as the specific meaning of the user changes, the user is different on the network security awareness and requirements will be different. From the ordinary user's point of view, could only hope that personal privacy or confidential information transmission on the network be protected against eavesdropping, tampering and forgery; and network provider in addition to care about these network information security, we must also consider how to deal with sudden natural disasters, such as military strikes against the destruction of network hardware, as well as unusual in the network how to restore network communications, and maintain the continuity of network communications.
In essence, the network security, including the composition of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious attacks on the destruction of both the technical aspects of network security issues, there are management issues, the two sides complement each other, are indispensable. Man-made network intrusion and attacks makes network security is facing new challenges.

Second, computer network security status quo
Computer network security is the network hardware, software and data systems are protected from accidental or malicious destruction of reasons, alteration, disclosure, the system continuous, reliable, normal operation of network services without disruption. Computer and network technology has the complexity and diversity, makes computer and network security has become a need to continue to update and improve the area. At present, hackers method has been more than the type of computer virus, and many attacks are fatal. In the Internet network, because the Internet does not have the time and geographical constraints, whenever there is a means to generate new attacks, we can in a week around the world, these attacks means the use of network and system vulnerabilities to attack computer systems and resulting in network paralysis. Worms, backdoor (Back-doors), Rootkits, DOS (DenialofServices) and Sniffer (network monitor) is a familiar means of several hacker attacks. However, none of these attacks means they reflect the astonishing power of today become worse. These types of attacks means the new variant, with previous attacks appeared methods, more intelligent, targeted against Internet-based protocols and operating system level. From the Web process control procedures to the kernel-level Rootlets. Hackers practices escalating renovation, to the user's ability to guard against information security challenge.

Third, computer network security precautions
1, to strengthen the internal network management and the use of safety awareness among staff, many computer systems commonly used passwords to control access to system resources, which is anti-virus process, the most vulnerable and the most economical methods. Network administrator and terminal operator privileges in accordance with their responsibilities, choose a different password for the application data legitimate operation, to prevent unauthorized users to access the data and the use of network resources.
On the network, software installation and management is crucial, it is not only related to network maintenance and management efficiency and quality, but also to the network security. A good antivirus software can be easily installed within minutes to the organization each NT server can also be downloaded and spread to all the purpose of the machine by the network administrator set up and manage to focus, it will work with the operating system and other security is closely linked to become a part of network security management, and automatically provide the best network virus defensive measures. When the computer virus on-line resources applications attack, such as the virus exists in the information-sharing network of media, it is necessary to the security at the gateway, on the network front-end for antivirus.
2, network firewall technology
Is a kind of used to strengthen the network access control to prevent the external network users to illegal means to enter the external network through the internal network, access internal network resources and protect the internal network operating environment special for Network Interconnection Devices. It is between two or more networks such as packet transmission link in accordance with a certain degree of security strategy to implement the inspection, to determine whether the network communication between are allowed to, and monitor the network running. Although the firewall is to protect the network from an effective means of hacking, but there are obviously inadequate: through the firewall can not protect against outside attack other means, can not prevent defectors from the inside and inadvertent threats posed by users, but also can not completely prevent the transmission of the virus have been infected with the software or documents, and can not protect against data-driven attacks.
3, security encryption technology
Encryption technology for the global e-commerce to provide a guarantee, so that Internet-based electronic trading system has become possible, thus improving the symmetric encryption and asymmetric encryption technology is still the mainstream of the 21st century. Symmetric encryption to the conventional password-based technology, computing encryption and decryption operations use the same key. Asymmetric encryption, encryption key that is different from the decryption key, encryption keys are made public, anyone can use, only the decryption key to decrypt people know.
4, the network host operating system security and physical security measures
Network firewall as the first line of defense and can not fully protect the internal network, must be combined with other measures to improve the safety of the system level. After the firewall is based on the network host operating system security and physical security measures. In accordance with the level from low to high, namely, the physical security of the host system, the core operating system security, system security, application services security and file system security; At the same time, host security checks and bug fixes, as well as a backup safety system as a supplementary safety measures. These constitute the entire network system, the second line of defense, the main part of a breakthrough to prevent the firewall as well as attacks from within. System backup is the last line of defense network system, used to attack after the System Restore. The firewall and host security measures is the overall system security by auditing, intrusion detection and response processor constitute the overall safety inspection and response measures. It from the network system firewall, network host or even directly from the network link layer on the extraction of network status information, as input to the intrusion detection subsystem. Intrusion Detection System in accordance with certain rules to determine whether there is any invasion of the incident, if the invasion occurred, the emergency treatment measures, and generate a warning message. Moreover, the system's security audit also can be used as the future consequences of aggressive behavior and to deal with security policy on the system to improve sources of information.
In short, network security is a comprehensive issue, involving technology, management, use and many other aspects, including both its own information system security issues, there are physical and logical technical measures, a kind of technology can only solve the problem on the one hand, rather than a panacea. To this end the establishment of a network with Chinese characteristics, security system, the need for national policies and regulations to support and joint research and development group. Security and anti-security like two sides of contradictions, always pick-up, so the security industry is a future with the development of new technologies and the continuous development of industry.

References:
[1] Huang Yi-qiang, et al. On the software development needs analysis phase of the main tasks. Quarterly Journal of Sun Yat-sen University, 2002 (01).
[2] Hu Daoyuan. Computer LAN [M]. Beijing: Tsinghua University Press, 2001.
[3] Zhu Lisen, even Shougong. Computer Network Application Technology [M]. Beijing: Patent Literature Publishing House, 2001.
[4] Xie Xiren. Computer Networks (4th edition) [M]. Beijing: Publishing House of Electronics Industry, 2003.
[5]孙小刚, Han Dong, et al. Oriented software engineering, Visual C + + Network Programming [M]. Beijing: Tsinghua University Press, 2004,11.

仅供参考,请自借鉴。

希望对您有帮助。

补充:您可以随时找我,我会帮你翻译好发过去,随时欢迎您的咨询。
温馨提示:内容为网友见解,仅供参考
无其他回答

计算机网络安全英语论文及翻译求助
要求是计算机网络安全方面的英语论文,翻译以后字数要在5000以上希望高手帮助还需要翻译的,谢谢啊,帮人帮到底啊... 要求是计算机网络安全方面的英语论文,翻译以后字数要在5000以上希望高手帮助还需要翻译的,谢谢啊,帮人帮到底啊 展开  我来答 1个回答 #热议# 职场上受委屈要不要为自己解释?ykansWY 2008-12-2...

如何安全上网英语作文80词
如何安全上网英语作文80词:The computer is one kind of tool, is uses to us, but not plays; The academic society uses the human is a smart person, will only play the human will be the stupid person, you may access the net, to look that the news, the understanding curr...

请求各位英语大虾翻译论文摘要(高分)
More and more computer users never leave home can access to global network system abundant information, economic, culture and military and social activities also strongly dependent on the network, a network society has been present before us.随着网络应用的不断增多,网络安全问题也越来越突...

网络安全英文摘要谁能帮我翻译一下?
Network security is the network hardware, software and system data to be protected, not because of accidental or malicious reasons, suffered damage, alteration, disclosure, the system for normal operation and reliable, network services are not interrupted. Network security is the essence o...

英语作文 网络的好与坏 60词左右,带翻译,急用
我认为互联网有优势和劣势。互联网的优势之一是,你可以做你想要在互联网上,当它被连接到独立的世界,如下载数据,程序,游戏,图片等,但网上有风险接受间谍件事情,它会尝试禁用或删除防间谍软件工具和抑制提供给用户警告按摩,它损害您的数据或系统在您的计算机。此外,你有风险找到坏人当聊天室尤其是...

求一篇关于计算机的文章,要有英语翻译。急急急急急急
计算机网络是计算机技术和通信技术紧密结合的产物,它涉及到通信与计算机两个领域。它的诞生使计算机体系结构发生了巨大变化,在当今社会经济中起着非常重要的作用,它对人类社会的进步做出了巨大贡献。从某种意义上讲,计算机网络的发展水平不仅反映了一个国家的计算机科学和通信技术水平,而且已经成为衡量其国力及现代化程度的...

the internet英语作文带翻译
翻译:互联网越来越广泛应用于我们的日常生活中。许多人喜欢在电脑工作。只要你可以在互联网上搜索你喜欢的。你可以找到任何你想要的信息。互联网速度快很少犯错误。人们可以玩游戏听音乐喜欢看电影。摘要技术计算机和互联网将会越来越普及它将人们的方式中获益。the internet英语作文篇二 Do you know the ...

写论文需要一段引言要英文的 本人英语不过关啊 求高手翻译用翻译软件...
It will make your information lost and make your computor break down. So it’s obviously important to protect the computor security, and the fire wall appears. A kind of effective means for protecting the Local Sub-net appears. The fire wall technology is welcome everywhere.

求一篇关于计算机的英语文章加翻译,500字左右。
5.1.1存储转发分组交换 但是在开始解释网络层详细情况之前,可能值得restate网络成协议运行的环境。这个环境可以在图5-1中看到。这个系统的主要元件是运输工具(被传送线连接的路由器),在阴影椭圆内显示,客户的工具是用椭圆外来表示。主机H1是直接从椭圆外连接到其中的一个路由器A上。相反,H2是在一...

翻译,论文摘要翻译
synthesis wiring system, key to the network architecture, the safe design and the equipment and the system shaping has made the detailed elaboration.校园网 Campus net 网络规划Network planning 交换 Exchange 因特网Internet 网络安全 Network security 设备Equipment 综合布线 Comprehensive wiring ...

相似回答