1 / 25
文档名称:

计算机网络安全毕业论文.doc

格式:doc   大小:129KB   页数:25页
下载后只包含 1 个 DOC 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

计算机网络安全毕业论文.doc

上传人:lanyou1106 2018/1/14 文件大小:129 KB

下载得到文件列表

计算机网络安全毕业论文.doc

相关文档

文档介绍

文档介绍:六安职业技术学院
网络安全
Network security
指导教师:
专业名称: 计算机系统维护
研究方向: 网络安全
所在系部: 信息工程系
姓名:

二○○九年六月
网络安全

(六安职业技术学院信息系,安徽六安 062134)
摘要:计算机网络安全问题,直接关系到一个国家的政治、军事、经济等领域的安全和稳定。目前黑客猖獗,平均每18秒钟世界上就有一次黑客事件发生。因此,提高对网络安全重要性的认识,增强防范意识,强化防范措施,是保证信息产业持续稳定发展的重要保证和前提条件。
文中首先论述了信息网络安全内涵发生的根本变化,阐述了我国发展民族信息安全体系的重要性及建立有中国特色的网络安全体系的必要性,以及网络的安全管理。进一步阐述了网络拓扑结构的安全设计,包括对网络拓扑结构的分析和对网络安全的浅析。然后具体讲述了网络防火墙安全技术的分类及其主要技术特征,防火墙部署原则,并从防火墙部署的位置详细阐述了防火墙的选择标准。同时就信息交换加密技术的分类及RSA算法作了简要的分析,论述了其安全体系的构成。最后分析网络安全技术的研究现状和动向。
关键词:网络安全,防火墙,RSA算法
Abstract
Zhu Yi
(puter Department Of Liuan Normal University,Wuhu Liuan 241000)
Abstract:work security problem, directly relates to domain the and so on a national politics, military, economy security and the stability. At present the hacker is rampant, in the average every 18seconds worlds has a time of hacker attack to occur. Therefore, enhances to work security important understanding, enhancement guard consciousness, the strengthened guard measure, is guaranteed the information industries continues the important guarantee and the prerequisite which stably develops.
In the article first elaborated the radical change which the work security connotation occurs, elaborated our country develops the nationality information security system importance and the establishment has the Chinese characteristic work security system necessity, as well work safety control. Further elaborated work topology safe design, including work topology analysis and work security brief analysis. Then specifically narrated work firewall security technology classification and it’s the main technical characteristic, the firewall deployment principle, and the position which deployed from the firewall in detail elaborated the firewall choice standard. Meanwhile has made the brief analysis on the exchange of information encryption technology classification and the RSA algorithm, elaborated its security system constitution. Finally analyzes work security technology the research present