1 / 101
文档名称:

(参考)企业网络安全漏洞分析及其解决方案.doc

格式:doc   页数:101页
下载后只包含 1 个 DOC 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

(参考)企业网络安全漏洞分析及其解决方案.doc

上传人:1017848967 2016/7/3 文件大小:0 KB

下载得到文件列表

(参考)企业网络安全漏洞分析及其解决方案.doc

相关文档

文档介绍

文档介绍:I 摘要为了防范网络安全事故的发生,互联网的每个计算机用户、特别是企业网络用户,必须采取足够的安全防护措施,甚至可以说在利益均衡的情况下不惜一切代价。事实上, 许多互联网用户、网管及企业老总都知道网络安全的要性,却不知道网络安全隐患来自何方,更不用说采取什么措施来防范胃。因此,对于互联网用户来说,掌握必备的网络安全防范措施是很有必要的,尤其是网络管理人员,更需要掌握网络安全技术,架设和维护网络系统安全。本论文前三章介绍了网络安全的概述,网络安全技术和网络安全漏洞分析;介绍了我国网络安全的现状和网络安全面临的挑战,以及漏洞的分类的分析。第四章主要讲了漏洞扫描系统的必要性,只有发现漏洞才能更好的维持企业网络安全秩序。第五章主要是实际应用的解决方案,介绍了无线网络安全实战,用实际的解决方案来说明主题。关键词: 网络安全漏洞解决方案 ABSTRACT To prevent the occurrence work security incidents, the puter user, especially the work users must take adequate safety precautions, perhaps even in the case of balancing the interests at all costs. In fact, many users, network management and corporate CEOs are aware work security to, but do not know where es from work security risks, not to mention the measures taken to prevent stomach. Therefore, users, the master work security measures is necessary, especially work management, but also need to work security technology, the construction and maintenance work system security. The first three chapters of this paper describes an overview work security, network security work security vulnerability analysis; describes the status of work security work security challenges, and vulnerabilities are presented. Chapter Four talked about the need for vulnerability scanning system, only to find loopholes in better maintenance of work security order. Fifth chapter is the practical application of the solution, introduced the actual work security, with practical solutions to illustrate the theme. Keywords: Network Security vulnerabilities Solutions II 目录摘要.................................................................................................................................................................. I 目录................................................................................................................................................................. II 前言................................................................................................................................