返回 历史论文 首页
Security Threatening Factors and Security Technologies of Network

  Abstract. With the aids of its advantage on functions, computer network can help users with many things. It can make automated analysis of various kinds of data, which provides a reliable data result for users. However its security draws our attentions as well. While computer network is used more and more widely, the security of network brings a lot of problems to users. For example, the lost or even theft of the data will raise large amount of economic losses. Against this point, this text focuses on analyzing the cause of the network security. After that we propose some security technologies which are targeted.
  Key words: computers, network threats, security technology, countermeasure.
  The operation system of computers has multiple operating functions. With its operating instructions of inner program code, it can realize the automated operation. This gives it great advantage in data processing. With the information age coming, the use of computer network become wider and wider. We use it in the management system, national defend system, scientific research system and so on. On the other side, the potential security threats of computer network cause great economic losses too. So it is a great problem we have to consider about that we should formulate efficient network security defend system.
  1 Main Security Threatening Factors of Network
  The factors which make the network security is exposed to threats conclude these following points:
  1.1 Program Factors
  Program code is the main operating instructions of computer network. When the designers make some mistakes when they are composing the program code, the security of the network operation will be weakened. Finally this will create the conditions of invasion for illegal intruders. Nowadays, every computer system is equipped with Trojan programs. Trojan program is a kind of hacker carrier that can realize remote control. When the Trojan server program is added to the computer, those hackers can invade the computer and damage the operating order and operating security of network.
  1.2 Viral Factors
  Virus is the greatest threat that the computer network is facing with. Its features of infection, spread, transitivity and destructivity can raise lots of security problems for those computer network users. After one computer is infected with the virus, virus will spread in the network in a short time. It will cause obstruction for the execution of the program code. Apart from this, with the computer operation system's updating and changing, the form and destructive ability of virus will become more complicated. Usually, its destructive power to the network will be much stronger.   1.3 Vulnerability Factors
  The security threats raised by the vulnerability reflect mainly on the systems and the servers. First of all, system vulnerability means the defects existing in the computer system. It is a kind of potential security threats. In the market, most of computers are installed with piracy version of system which is with much vulnerability and cannot be fixed in time. Secondly, the server vulnerability is result from the CGI program which is used by the server or explorer. This will reduce the security coefficient.
  1.4 Hackers Factors
  In recent years, the network crime causes so large amount of economic losses that we can't estimate or even imagine. Hackers are usually the computer program designers who are quite well in computer programs. They destroy users' network through modifying the program code or working out higher-level language. Finally they can steal the data which is valuable to them. The network system of financial industry is the main target invaded by hackers. From this they can take advantage of those accounts to transmit funds, which causes great damage to the development of the industry.
  1.5 Management Factors
  We have to admit the fact that our incomplete daily management of computer network is also one of the factors that cause the network security threat. Although many enterprises realize office automation gradually, the daily maintenance measurements of network are also significant. Unfortunately, our enterprises in the society often ignore the work of maintenance of network security because of the high operating costs.
  2 Commonly Used Technologies of Maintaining
  Network Security
  Considering and analyzing the actual applying status of computer, those system developers formulate a series of network security technologies which are relatively perfect. They can insure the safety of network from multiple aspects such as the program composing, network operating and system controlling.
  2.1 Data Encryption
  Data transmission is the major process of the network invasion. When the users are transmitting files, if the network is meanwhile interfered by outer factors, the data's security will be threatened. The data might be damaged or even the whole file is intercepted like what picture I shows. As a solution, users can improve the safety of files by data encryption.
  2.2 Intrusion Detection
  The corresponding detecting program for network is also one of the methods to avoid the network security threats. It can detect the information in data before or after the transmission. Once it discovers the abnormal signals it will cut off the transmission or send them back to the sender. The invasion detection technology can ensure the network safety from 2 aspects. They are software and hardware. Like picture II shows, when users find that the data in the network is threatened, they can cut off the network connection to end the data transmission. In addition, they can take advantage of fire wall to detect the network so that they can filter the data packets that they gather.   2.3 Security Scanning
  The function of the security scanning technology is to check and deal with the network vulnerabilities. It can discover the abnormal program by scanning and deal with the problems in time. Generally speaking, security scanning technology is a composite test on the local network, websites, host computer operation system, systematic service, fire wall system and other aspects. Users can also make use of this technology to make testament on the software and hardware connection of computer system.
  2.4 Anti-virus Software
  Anti-virus software is a widely used network security technology. It is easy and convenient to install and use. Its advantages also include the swift updating and so on. Apart from these, the anti-virus software has strong targeted. Its major work is to find and kill the computer virus and clean up everything abnormal in the computer. For users, they only need to install the anti-virus software on a regular basis so that they can deal with those program code with potential threat in it.
  3 The Security Technology Under the Composite Management Mode
  Under composite management mode, security technology should be running in three aspects. They are product purchasing, operation management and equipment maintenance. Users ought to pay attention on the control of network composite management mode.
  3.1 Product Purchasing
  Enterprises need to purchase probable computer products according to their internal operation. Their goal is to ensure the equipment of hardware and performance of software can meet their need of operation. Users should also select the corresponding facilities, combing the actual operation status and adjust the control system, software installing and hardware connection. Only with these, users can prevent those security threats caused by the computer products themselves.
  3.2 Operation Management
  Networking office automation has been a modern and advanced managing mode for enterprises. Firstly, we should check and manage the computer network on a regular basis during its operation. Secondly, we should try to avoid those threats caused by the wrong operation towards computers. For example, we can make use of the network management to avoid the risk of wrong human operation, and create a safe, reliable and stable network circumstance like we show in picture III.
  3.3 Equipment Maintenance
  Considering the constant increasing need of functions for enterprises or users, we should update the computer equipments or software moderately. When updating, we should pay attention on the relative maintenance measurements as well.   4 Conclusion
  The factors cause the threats of network security come from multiple aspects. Its destructive power on computer network can't be ignored anytime. When facing the security threats of computer network, users should choose multiple security technologies and managing strategies to ensure their network security. They should make sure that the network is operating under a safe condition.
  References
  1. Wu Shuhong, Current Potential Threats and Protection of Computer Network [J], Silicon Valley, 2009, (06).
  2. Liu Yang, Discussion on security and prevention of computer network [J], Radio and Television Information, 2009, (03).
  3. Bai Aihua, Zhang Qingan, Investigation on network security technology [J], Scientific Information, 2009, (06).
  4. Lin Guoqing, Analysis on the computer network security and fire wall technology [J], Journal of Enshi Polytechnic, 2007, (01).
  5. Jiang Lan, Computer network security and prevention technologies [J], Scientific Information, 2009, (06).
  6. Wu Hui, Research on computer network security technologies [J], Silicon Valley, 2009, (05).
  7. Ma Rongping, Computer network security and solution against ARP invasion [J], Journal of Liaoning Educational Administration Institute, 2009, (02).


【相关论文推荐】
  • The Study on Network Security Strategy based on Security Evaluation
  • Cloud computing and network security research
  • Research on Computer Network Security and Protection
  • Design and Realization of Security Network Database
  • The Application of Support Vector Machine in Network Security Evaluation
  • Followers of the Social Media Network and National Security
  • Network database based on the web design and security
  • Research on Computer Network Security and Prevention Strategy