Joke Collection Website - Bulletin headlines - What is computer network technology task-driven
What is computer network technology task-driven
Abstract: Computer networks have brought great convenience to people, but they are also experiencing the impact of spam, viruses and hackers, so computer network security technology has become more and more important. The establishment and implementation of strict network security strategies and sound security systems are the basis for truly realizing network security. Keywords: Computer network security defense measures 1.1 What is computer network security? Computer network security refers to the use of network management controls and technical measures to ensure that the confidentiality, integrity and availability of data are protected in a network environment. Computer network security includes two aspects, namely physical security and logical security. Physical security means that system equipment and related facilities are physically protected from damage, loss, etc. Logical security includes information integrity, confidentiality and availability. Computer network security not only includes networking hardware and software that manages and controls the network, but also includes shared resources and fast network services. Therefore, the definition of network security should consider covering all aspects of computer networks. Referring to the definition of computer security given by ISO, it is believed that computer network security refers to: "Protecting the hardware, software and data resources in the computer network system from being damaged, altered, or leaked due to accidental or malicious reasons, so that the network system is continuous and reliable "Network security is the security of information on the network." Computer network security means that the hardware, software of the network system and the data in the system are protected from being damaged, altered, or leaked by accidental or malicious reasons. The system can operate normally and continuously and reliably, and the network services are not interrupted. . Broadly speaking, all relevant technical theories involving the confidentiality, integrity, availability, authenticity and controllability of information on the network are areas of network security research. From the user's perspective, they hope that information involving personal privacy or business secrets will be protected by confidentiality, integrity, and authenticity on the Internet. At the same time, they hope that the information stored on the computer system will be protected from unauthorized access and destruction by users. From the perspective of network operation and management, they hope that operations such as access, reading and writing of local network information will be protected and controlled, to avoid threats such as "trapdoors", viruses, illegal access, and denial of access, and to prevent and defend against network hackers. attack. From a social education perspective, unhealthy content on the Internet will hinder social stability and human development, and must be controlled. 1.2.1 Computer virus Computer virus refers to a set of computer instructions or program codes compiled or inserted into a computer program that destroy computer functions or destroy data, affect the use of the computer, and can accurately replicate itself. Computer virus is contagious and destructive. It is a piece of program code that can cause damage. It is adapted to the system or network environment where it is located and cooperates with it to cause damage. It is a specially crafted program code that can invade others through unauthorized means. Computer programs cause some kind of malfunction to the computer system or completely paralyze it. For example, our common worms can make our computers run slower and slower, to the point where we can't bear it. Computer viruses themselves are contagious, covert, stimulating, replicative, and destructive. With the development of computer and network technology, there are more and more types of computer viruses, their spread speed is accelerating, and they are becoming more and more destructive. 1.2.2 Hackers and Hacker Software Hackers generally refer to people who use various illegal means to invade computers to gain unauthorized access. They often visit various computer systems uninvited, intercept data from compromised computers, steal intelligence, tamper with files, and even disrupt and destroy systems. Hacker software refers to a type of program that is specifically used to attack remote computer equipment through the network, thereby controlling, stealing, and destroying information. It is not a virus, but it can spread viruses at will. With the development of the Internet, hacker activities have become more and more rampant. For example, the five "computer masters" mentioned in Hangzhou used "hacking" technology to remotely steal game coins worth more than 140,000 yuan. On May 23, 2009, he was sentenced to 10 and a half years in prison and fined 50,000 yuan by the Chongqing Jiulongpo District Court for the crime of theft. This is how hackers have developed to this day. They are no longer heroes in the narrow sense who simply study new technologies or fight against profiteering. In addition to being unable to resist the temptation of money and invading computers to steal data for sale or blackmail to make money, there are also those with political motives. Motives and other ulterior motives.
1.2.3 System and network security vulnerabilities. Flaws in the design of systems, protocols, databases, etc. have led to the creation of various vulnerabilities, leaving the network open and the main factor causing network insecurity. 1.2.4 User operation errors and weak awareness of prevention. Users do not have a strong awareness of prevention, set passwords too simply, leak their accounts at will, browse unfamiliar web pages, download, etc., which will bring security risks to the network. 2 Commonly used network security technologies 2.1 Firewall technology Although various network security technologies have emerged in recent years, firewalls are still the most commonly used technology in network system security protection so far. According to the statistics of network security products tested in 2000 by the Computer Information Security Product Quality Supervision and Inspection Center of the Ministry of Public Security, firewall products ranked first in terms of quantity, followed by intrusion detection products and network security scanning. A firewall system is a network security component. It can be hardware, software, or a combination of hardware and software. This security component is located at the boundary between the protected network and other networks and receives data flows in and out of the protected network. , and perform filtering or other operations according to the access control policy configured on the firewall. The firewall system can not only protect network resources from external intrusion, but also intercept valuable information transmitted from the protected network to the outside. Firewall systems can be used to isolate the internal network from the Internet, or to isolate different network segments of the internal network. The latter is often called an intranet firewall. 2.2 Intrusion detection system Network intrusion detection technology is also called network real-time monitoring technology. It checks the data flow on the network in real time through hardware or software and compares it with the intrusion feature database in the system. Once signs of attack are found, immediately React according to the actions defined by the user, such as cutting off the network connection, or notifying the firewall system to adjust the access control policy, filtering out intrusive data packets, etc. 2.3 Network security scanning technology Network security scanning technology is a security technology developed to enable system administrators to promptly understand the security vulnerabilities existing in the system and take corresponding preventive measures to reduce system security risks. Using security scanning technology, security vulnerabilities in local area networks, Web sites, host operating systems, system services, and firewall systems can be scanned. System administrators can understand the unsafe network services that exist in the running network system and in the operating system. It can also detect whether there are security holes in the host system that may lead to buffer overflow attacks or denial of service attacks. It can also detect whether there are eavesdropping programs installed in the host system, and whether there are security holes and configuration errors in the firewall system. Other network security technologies include encryption technology, identity authentication, access control technology, data backup and disaster recovery and VPN technology, etc. 3 Network security protection methods 3.1. Technical protection methods The network information system is attacked and intruded, which has a lot to do with its own security technology. In particular, the construction of my country's network security information system is still in its infancy, and the security system has its own incompleteness and vulnerability, which creates opportunities for criminals to take advantage of it. The establishment of network information systems uses high technology as the medium, which makes the governance of the information environment face more severe challenges. According to the actual situation, the following technical means can be adopted: (1) Network security access control technology. By establishing an access control system for specific network segments and services, most attacks can be prevented before they reach the attack target. Security measures that can be implemented include: firewall, VPN equipment, VLAN division, access control list, user authorization management, TCP synchronization attack interception, routing spoofing prevention, real-time intrusion detection technology, etc. (2) Identity authentication technology This technology is widely used in network structures such as wide area networks, local area networks, and dial-up networks. Used for identity authentication of network devices and remote users to prevent unauthorized use of network resources. (3) Encrypted communication technology This measure is mainly used to prevent important or sensitive information from being leaked or tampered with. At the heart of this technology is an encryption algorithm. The encryption methods mainly include: symmetric encryption, asymmetric encryption, irreversible encryption, etc. (4)Backup and recovery technology. For key network resources such as routers and switches, dual-machine backup is required so that they can be restored in time in the event of a failure. (5) At the system and application level, including computer anti-virus technology using a secure operating system (up to BZ level), key software and hardware of the application system, and backup of key data. Anti-virus technology and backup measures are commonly used traditional security technologies, while secure operating systems are a new development trend. 2.2. Legal protection means.
In order to use policy and legal means to regulate information behavior, combat information infringement and information crime, and maintain network security, various countries have formulated laws and policies. In 1973, Switzerland passed the world's first law to protect computers; 47 states in the United States currently have enacted relevant computer regulations, and the federal government has also promulgated the "Counterfeit Access Means and Computer Fraud and Abuse Act" and the "Federal Computer Security" Law; in 1987, Japan added several clauses to punish computer crimes in its criminal law and stipulated penalty measures. In addition, the United Kingdom, France, Germany, Canada and other countries have also promulgated laws and regulations related to computer crimes. In 1992, the International Organization for Economic Cooperation and Development published security guidelines on information systems. Countries follow these guidelines to adjust domestic information system security work. Our country's new criminal law passed in March 1997 stipulated for the first time computer crime, that is, the crime of damaging computer information systems, which refers to violating national regulations and destroying the functions of computer information systems and the data and applications stored, processed, and transmitted in the information systems. , behavior that causes the computer information system to fail to operate normally and has serious consequences. According to the provisions of Article 286 of the Criminal Law, whoever commits this crime shall be sentenced to fixed-term imprisonment of not more than 5 years or criminal detention; if the consequences are particularly serious, he shall be sentenced to fixed-term imprisonment of not less than 5 years. Other relevant laws and regulations "Regulations of the People's Republic of China on the Security Protection of Computer Information Systems", "Interim Regulations of the People's Republic of China on the Management of International Networking of Computer Information Networks", "Computer Information Systems of the People's Republic of China" The Interim Provisions on the Management of International Network Networks and the Implementation Law of the People's Republic of China on the Interim Provisions on the Management of International Networks on Computer Information Networks have also been promulgated one after another. The promulgation of these laws and regulations has provided information for combating computer crimes and cyber crimes and protecting network security. legal basis. 3.3. Management protection means. It is also extremely important to work hard to ensure network security through management measures. At this point, on the one hand, we need to strengthen personnel management and establish a high-quality network management team to prevent internal attacks, unauthorized use, misuse and leaks. It mainly refers to strengthening the security management of computers and systems themselves, such as the security of important places such as computer rooms, terminals, and network control rooms. Electronic door locks, automatic monitoring systems, automatic alarm systems and other equipment should be introduced to important areas or highly confidential departments. Identification and verification of staff to ensure that only authorized personnel can access computer systems and data. A common method is to set a password or password. System operators, managers, and auditors are set up separately to restrict each other to avoid excessive authority of managers who wear multiple hats. On the other hand, certain management methods and rules and regulations are used to limit and restrain restless computer workers to prevent the generation and spread of computer viruses and hacker programs, and through professional ethics education for computer operators to make them fully aware of Aware of the harm caused by computer viruses and hacker programs to computer users, and realizing that spreading viruses and illegal intrusions are unethical and even illegal, every computer worker must become a defender of network security. To a certain extent, the implementation of good management methods is more effective than using technical methods to achieve protection. We should pay enough attention to it ideologically. It is necessary to adopt the eight-character policy of "prevention first, combining prevention and control", and formulate practical management measures by strengthening management manpower. 3.4. Ethical and moral protection means. Ethics is a normative system formed by people based on their own evaluation standards. It is not formulated by any agency and does not have coercive force. It is affected by inner norms, traditional habits and social public opinion. It exists in the inner world of every information person. Therefore, the protective power of ethics and morality on network security comes from the inner driving force of information people. It is conscious, active, and anytime and anywhere. This protective effect has the characteristics of extensiveness and stability. In the category of ethics and morality, external coercive force has become insignificant. It emphasizes self-consciousness and good discipline without the need for external heteronomy. This kind of respect for network security from the heart is undoubtedly more effective than external coercive force in protecting network security. Deep reality. Precisely because ethics and morality can establish an intrinsic value orientation system based on "truth, goodness, and beauty" in the inner world of an individual, and can pursue equality and justice from the level of self-awareness, it can play a role in the field of protecting network security. Protection methods such as technology, law and management cannot play a role. 4 Preventive measures for computer network security 4.2 Install firewall and anti-virus software The firewall is the "portal" between the internal network and the external network. It comprehensively manages the communication between the two to ensure safe and smooth information exchange between the internal and external networks. .
The firewall uses packet filtering, circuit gateway, application gateway, network address conversion, virus firewall, mail filtering and other technologies to prevent the external network from knowing the situation of the internal network, and has strict control and detailed records of users' use of the network. The firewall used by personal computers is mainly a software firewall, which is usually installed in conjunction with anti-virus software. Anti-virus software is mainly used for anti-virus and anti-virus, but it should be noted that anti-virus software must be upgraded in time and upgraded to the latest version in order to provide more effective anti-virus. Since viruses are constantly being updated, anti-virus software also needs to be updated frequently. The difference between anti-virus software and firewalls is that anti-virus software is a doctor, used to detect and kill various viruses. Firewalls are gatekeepers that prevent hackers and strangers from accessing your computer. If you have installed anti-virus software and firewall, you should upgrade them in time, and run the anti-virus software frequently to prevent viruses. 4.3 Install vulnerability patches in a timely manner. Microsoft has a clear definition of vulnerabilities: vulnerabilities are weaknesses that can be exploited during attacks. They can be software, hardware, program shortcomings, functional design or improper configuration, etc. Miller from the University of Wisconsin in the United States gave a research report on today's popular operating systems and applications, pointing out that there are no loopholes and defects in software. Nowadays, more and more viruses and hackers are using software vulnerabilities to attack network users. For example, the famous Shockwave virus uses Microsoft's RPC vulnerability to spread, and the Sasser virus uses a buffer overflow vulnerability in Windows' LSASS to attack. When there are loopholes in our system programs, it will cause great security risks. To correct these vulnerabilities, software vendors release patches. We should install vulnerability patches in a timely manner to effectively solve the security problems caused by vulnerable programs. To scan for vulnerabilities, you can use specialized vulnerability scanners, such as COPS, tripewire, tiger and other software, or you can use 360 ??Security Guard, Rising Kaka and other protection software to scan and download vulnerability patches. 4.4 Develop good Internet habits. If you install protective software and update it in time, and download and install vulnerability patches in a timely manner, your computer is basically safe. But in many cases, network Trojans and various viruses are “invited” by ourselves. Therefore, developing good Internet habits can prevent viruses to a great extent. 4.4.1 Do not browse unfamiliar web pages or open unfamiliar emails casually to guard against "phishing". When accessing a website, especially when you need to enter an account number, you should carefully confirm the legitimacy of the website. Before opening unfamiliar emails, perform anti-virus first. 4.4.2 Do not open files sent by strangers casually when using chat tools to prevent instant messaging viruses. In addition to not opening files and URL links sent by strangers, you should also close unnecessary services, such as FTP clients, Telnet, and Web services. 4.4.3 Download software from well-known websites to prevent software from being bundled with Trojans and spyware. The software provided by the more famous download sites such as Sky Software, Huajun Software, Duote Software, etc. is relatively safe. 5 Conclusion Security issues have always been accompanied by the development of computer networks. In the face of faster and faster informatization progress, various new technologies are constantly emerging and applied. Network security will face more severe challenges. Therefore, regarding computer network security, problem, there is still a lot of work to be done to research, explore and develop. References [1] Wang Fuchun. Trial network security and protection [J]. Journal of Jiangxi Administration Institute, 2006. [2] Fang Qian. A brief discussion on computer network security [J]. Computer and Information Technology, Network World [3] Huang Jian and others. Computer network security technology. Southeast University Press, 2001, (8) [4] Yang Bin. A brief analysis of computer network information security technology research and development trends [J]. Applied Science and Technology, 2010 [5] Li Yong. A brief discussion of computer network security and prevention [J]. J]. Journal of Bengbu Party School 2009(1)[6] Liu Xiaozhen. Computer network security and protection[J]. Mechanical Management Development, 2010(6). Computer Information Management Graduation Thesis Brief Discussion on Information Management and Knowledge Management Abstract: Through information management , a comparative analysis of the concept of knowledge management, discusses the differences and connections between knowledge management and information management, and elaborates on the expansion, improvement and deepening of knowledge management in terms of management objects, management methods and technologies, and management goals. Finally, it is concluded that knowledge management is the inevitable result of information management adapting to the development of the knowledge economy era, and knowledge management is a new growth point in the development of information science. Keywords: information management; knowledge management; comparative study l The concept of information management and knowledge management 1.1 The concept of information management.
‘Information management’ is a term that has been used with increasing frequency since it was proposed abroad in the 1970s. Regarding the concept of "Wei management", there are also many different interpretations abroad. Although scholars have different opinions on the connotation, extension and development stages of information management, the generally accepted concept of information management can be summarized as follows: Information management is In order to effectively develop and utilize information resources, individuals, organizations and society use modern information technology as a means to implement social activities of planning, organizing, commanding, controlling and coordinating information resources. It summarizes the three elements of information management: personnel, Technology and information; it also embodies the two aspects of information management: information resources and information activities; it reflects the basic characteristics of management activities: planning, control, coordination, etc. Through extensive review of domestic and foreign literature, it is found that people have a strong understanding of information management. The understanding is reflected in the following five different meanings: information content management, information media management, computer information management, management information system, and team management of the information industry or industry. 2. The definition of knowledge management in China. There are many opinions abroad. In foreign countries, Quidas believes that knowledge management is to meet various needs that arise now or in the future, identify and explore existing and acquired knowledge assets, and develop new opportunities. Knowledge management refers to the process of creating, acquiring and using knowledge in order to enhance the performance of the organization. Daniel O'Leary believes that the information received by the organization from various sources is converted into knowledge and the knowledge is connected with people. The process of getting up. Maas believes that knowledge management is a systematic process of discovering, selecting, organizing, filtering and expressing information, with the purpose of improving employees' understanding of specific issues. Carl Ferra Paul, one of the founders of the American Del Group. Knowledge management is about application. It is a new way for enterprises to realize the sharing of explicit knowledge and tacit knowledge, and how to identify, acquire, develop, decompose, store and transfer knowledge, so that each employee can maximize the efficiency. While contributing their accumulated knowledge, they can also enjoy the knowledge of others. Realizing the sharing of knowledge is the goal of knowledge management. In China, Professor Wu Jiapei believes that knowledge management is a new level of information management development. Information management is different in previous stages. It requires connecting information with information, information with activities, and information with people. In the interactive process of interpersonal communication, through the integration of information and knowledge (in addition to explicit knowledge, it also includes tacit knowledge)* **Sharing, using the intelligence of the group to innovate to gain competitive advantage. He pointed out that the broadest understanding of knowledge management is that knowledge management is management in the knowledge era, and the narrowest understanding is that knowledge management is just about management. Management of intellectual assets (or intellectual capital). 2. The connection between information management and knowledge management. Information management is the foundation of knowledge management, and knowledge management is the further deepening and development of information management in depth and breadth. Information management provides a solid foundation for knowledge management. Because sharing information is one of its key factors, if an organization cannot conduct effective information management, it will not be able to successfully carry out knowledge management. First, knowledge management requires the support of information management theory and technology. Management of knowledge warehouse hiss, knowledge warehouse! is a continuous process. In the era of knowledge economy, knowledge has become a basic means of production, but knowledge innovation cannot be separated from information, and knowledge cannot simply be generated from the inductive summary of the obtained data. The interaction between knowledge and information determines the evolution of information resources. In the process of becoming knowledge resources, it is inevitable to use information management theory and technology to perceive, extract, identify, retrieve, plan, transfer, develop, control, process, integrate, store and utilize information resources. Through the learning process and value Cognition transforms information into knowledge. The development of information management theory and technology provides a unique environment and conditions for the collection and processing, exchange and sharing, application and innovation of knowledge, laying a solid foundation for the implementation of knowledge management projects. Therefore, knowledge management and information management are interdependent. Secondly, knowledge management is the sublation of information management. This is mainly reflected in three aspects: First, traditional information management mainly provides primary and secondary documents, while knowledge management is no longer limited to using one-sided information to meet user needs, but systematically analyzes user needs. Provide users with comprehensive and complete solutions to help users select useful documents and improve the efficiency of knowledge acquisition. Second, traditional information management is limited to the management of information and ignores the management of people. In fact, in the entire flow of information acquisition, talent is the core.
Knowledge management believes that the management of people can not only provide a wide range of knowledge sources, but also establish good organizational methods to promote the dissemination of knowledge, which adapts to the requirements of the knowledge economy era. The third is knowledge management through the management of knowledge. Abandoning the work model of passively processing information resources in information management, it integrates with the entire process of knowledge exchange, sharing, innovation and application, making knowledge management the core capability of knowledge innovation. Third, knowledge management is the extension and development of information management. If interest management transforms data into information and makes information serve the goals set by the organization, then knowledge management transforms information into knowledge and uses knowledge to improve the adaptability and innovation capabilities of a specific organization. Information management has experienced document management, computer management, information resource management, competitive intelligence management, and then evolved into knowledge management. Knowledge management is a new stage in the development of information management. It is different from previous stages of information management. It requires the connection of information and information, information and activities, and information and people. In the interactive process of interpersonal communication, through information and knowledge (except In addition to explicit knowledge, it also includes the sharing of tacit knowledge), using the wisdom of the group to innovate to gain competitive advantage. 3 Comparative study of information management and knowledge management The main differences between information management and knowledge management: 3.1 Information management activities mainly involve two elements: information technology and information resources, while knowledge management also requires information technology and information resources. Manage human resources. The goal of knowledge management is to use information technology, integrate information resources and human resources, and promote the rapid flow and sharing of knowledge resources within the organization. Effectively control the mutual transformation of explicit knowledge (information resources) and tacit knowledge (human resources) to achieve knowledge innovation. 3.2 From the perspective of management objects, information management focuses on the management of explicit knowledge (information resources), while knowledge management focuses on the management and development of tacit knowledge (information resources). 3.3 The focus of information management is to solve the problems of orderliness and easy inspection of social information flow and the integration of information resources. Mainly through the collection, processing and processing of information, information resources that are highly relevant, binding, retrieval and utilization are formed. The focus of knowledge management is to analyze, synthesize and summarize information, upgrade information into knowledge resources of great value to user decision-making, and realize knowledge discovery, knowledge creation and knowledge utilization. 3.4 Information management emphasizes the processing, preservation and service of information; knowledge management focuses on the sharing, innovation and utilization of knowledge. Traditional drama department management focuses on the collection, sorting, analysis, transmission, and utilization of information and knowledge resources. It regards explicit knowledge as the only object of management and ignores knowledge encapsulation. Knowledge management turns the information management platform and mechanical method into dynamic knowledge innovation activities, thereby raising information management to a higher level. 4. The transformation of information management into knowledge management. Knowledge management is the product of the information management process, which means that knowledge management is a new stage in the development of information management. In summary, knowledge management is produced and developed as people continue to deepen their understanding of resources and improve their management capabilities. It is an advanced compound of human resource management and knowledge resource management, and represents the development direction of information management. From information management to knowledge management, it has roughly gone through three stages: from the 1940s and before the 1940s, it was called the document information management stage, also called the traditional manual information management stage; from the 1950s to In the early 1980s, due to the rapid increase in the total amount of information and the severe situation of information influx, information processing technology received great attention, and information systems and public automation systems were widely used. This was the stage of information technology management; from the 1980s to the mid-1990s , this period in which information resources and various elements of information activities are the management objects is called the information resource management stage. Since 1995, under the influence of modern idle technology and network technology, it has entered the knowledge management stage, that is, the comprehensive integration stage of information management, which marks the expansion of information management into the application field of knowledge management. The transformation from information management to knowledge management is a further manifestation of "people-oriented" management in management theory and practice. People become the object of knowledge management and also the purpose of knowledge management. Knowledge management is the inevitable result and trend of information management adapting to the development of the economic era. It is a new growth point in the development of information science and a full reflection of the essence, goals and tasks of information science. Implementing knowledge management and promoting informatization construction marks the beginning of human society entering the era of knowledge civilization of global economic integration.
- Related articles
- Urgent! ! Solutions to the problems between opening date and trial operation
- The Strategy and Strategy of Monroe and Guan Yu is a complete collection of strategic wisdom of the Three Kingdoms.
- Why can Tik Tok still sell course recording and broadcasting?
- Short sentences for cheering sports meeting
- What are the two cards of civilization, one table and two pictures?
- Ask for an English speech, patriotic theme, high school level 3~5 minutes.
- On-the-job learning experience
- We are all dream catchers who write compositions.
- How about esckn95 mask
- What should I do if my mobile phone is flooded? How to deal with it?