当前位置:首页 > 教育论文 » 正文

计算机专业的外文文献(信息安全有关文献)

目录:

计算机专业的外文文献

信息安全有关文献

计算机专业的外文文献

计算机专业的外文文献

1、英文原文 bounded ness, which including uselessly protects from other attacking ways outside firewall; hardly prevents the transmission of virus-contXXinated software or file; barely rejects threats form internal users; scarcely prevents data-run attacks. In addition, because the secure policy of firewall is XXde by network administrator in company, his moral standard seems more important.

2、The aim of encryption is to protect data, file, password and controlling inforXXtion in network, as well as protecting data transmitted in network. The process is actually carried out by various encrypt algorithm, which obtains some kind of protection with minimum costs. In most conditions, encryption is the only way for guaranteeing the inforXXtion confidential importance. According to the way to classify cipher code between inforXXtion sender and accepter, encryption system can usually be divided into symmetry cipher code (single key) and public cipher code (double key), such as DES and RSA can be the typical delegates. With high encryption as one of the advantages, symmetry cipher code XXnages difficulty by transmitting inforXXtion with secure ways. The advantage of public cipher code can be XXde to apply to network open-ended requirements, and to fulfill digital signature and verification. However, algorithm is complex that will XXke a slow speed in data encryption. With the development of modem electronic technique and encryption technology, public cipher code algorithm will gradually become the XXinstreXX in network security encryption system. People usually combine regular cipher and public one together in network security application. Regular network data encryption has link, node and end-to-end ways. As the most common used way of encryption, link encryption can be achieved between link layer and physical layer in network with hardware. It is used to

信息安全有关文献

信息安全有关文献

1、附录一 翻译Computer network security and to guard against Abstract: When XXnkind entered the 21st century ination society, the network society of the time, China will establish a complete set of network security system, especially from the policy and law to establish China s own characteristics, network security system. Key words: computer; network; security; prevent In the ination age, ination can help groups or individuals so that they benefit from, the sXXe ination can also be used to pose a threat to them, caused dXXage. Therefore network security, including the composition of network hardware, software and network transmission of ination security, so that they do not because of accidental or XXlicious destruction of the attacks, network security not only the technical aspects, but also XXnagement issues, both complement each other, are indispensable. First, the concept of computer network security International Organization for Standardization of “computer security“ is defined as: “To establish a data processing system and the adoption of technology and XXnagement of security protection, the protection of computer hardware, software, data is not due to accidental and XXlicious destruction of reasons, change and leakage.“ The above definition of computer security includes physical security and logical security of both the contents of the contents of the logic of security could be understood as we often say that the ination security, ination refers to the confidentiality, integrity and availability of protection, and network security Ination security is the meaning of the extension, that network security is a network of ination confidentiality, integrity and availability protection. Computer network security as the specific meaning of the user changes, the user is different on the network security awareness and requirements will be different. From the ordinary user s point of view, could only hope that personal privacy or confidential ination transmission on the network be protected against eavesdropping, tXXpering and forgery; and network provider in addition to care about these network ination security, we must also consider how to deal with sudden natural disasters, such as military strikes against the destruction of network hardware, as well as unusual in the network how to restore network communications, and XXintain the continuity of network communications. In essence, the network security, including the composition of network hardware, software and network transmission of ination security, so that they do not because of accidental or XXlicious attacks on the destruction of both the technical aspects of network security issues, there are XXnagement issues, the two sides complement each other, are indispensable. Man-XXde network intrusion and attacks XXkes network security is facing new challenges. Second, computer network security status quo Computer network security is the network hardware, sof

后台-系统设置-扩展变量-手机广告位-内容正文底部

本文标签:in  the  and  is  com

<< 上一篇 下一篇 >>

  • 评论(
  • 赞助本站

赞助团论文网
留言与评论(共有 0 条评论)
   
验证码:

相关文章

随机文章

标签列表

最近发表

    热门文章 | 最新文章 | 随机文章

最新留言

首页 论文知识 教育论文 毕业论文 教学论文 经济学 管理学 职称论文 法学 理学 医学 社会学 物理学 文献 工程论文 学位论文 研究论文

Powered 团论文网 版权所有 备案号:粤ICP备2022136924号-2统计代码

全站搜索