[go: up one dir, main page]

CN109600397A - A kind of network security monitoring and managing method - Google Patents

A kind of network security monitoring and managing method Download PDF

Info

Publication number
CN109600397A
CN109600397A CN201910076567.XA CN201910076567A CN109600397A CN 109600397 A CN109600397 A CN 109600397A CN 201910076567 A CN201910076567 A CN 201910076567A CN 109600397 A CN109600397 A CN 109600397A
Authority
CN
China
Prior art keywords
network
data
access control
access
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910076567.XA
Other languages
Chinese (zh)
Inventor
钱乐旦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wenzhou University
Original Assignee
Wenzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wenzhou University filed Critical Wenzhou University
Priority to CN201910076567.XA priority Critical patent/CN109600397A/en
Publication of CN109600397A publication Critical patent/CN109600397A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to technical field of network security, the invention discloses a kind of network security monitoring and managing methods, access control including network, the attack-defending of internet worm, the safety of data, network hole reparation and inspection and the security protection of computer, the invention is illustrated danger present on network from many aspects and proposes corresponding solution, it can preferably solve the problems, such as network security, to avoid the infringement of virus, and to being made that regulation in the method using network of user, so as to effectively improve the safety and normalization that internet uses.

Description

A kind of network security monitoring and managing method
Technical field
The present invention relates to technical field of network security more particularly to a kind of network security monitoring and managing methods.
Background technique
Network security refers to that the data in the hardware, software and its system of network system are protected, not because accidental or The reason of person's malice and by destruction, change, leakage, system is continuously reliably normally run, and network service is not interrupted.
Network security monitoring and managing method in the prior art is incomplete and specific, and the user without being directed to user Formula is specifically explained, therefore is unfavorable for promoting.
Summary of the invention
The invention proposes a kind of network security monitoring and managing methods, to solve the problems mentioned in the above background technology.
The invention proposes a kind of network security monitoring and managing methods, include the following steps:
A, the access control of network: access control is the important means of Protection of Network Security and protection, its main task It is maintenance network system security, guarantees that Internet resources are not illegally used and access very much, in technology realization, including it is following several A part:
A1, access control: access control provides first layer access control for network access, is network access Barrier at first, which user it, which controls, can log on to server and obtain Internet resources, control permit user-network access when Between and permit them and network in some specific work station;
A2, resources accessing control: being the access control management to object entirety resource information, including file system Access control (file directory access control and system access control), file attribute access control, information content access control with And file directory access control;
The access control of A3, the network port and node: node and port in network often encrypted transmission data, these are heavy The management of position is wanted to must be prevented from the attack that hacker starts, for managing and modifying data, it should be enough it is required that visitor provides Prove the validator of identity;
B, the attack-defending of internet worm, specifically includes the following aspects:
B1, of unknown origin Email and file are not opened arbitrarily, not run stranger at will to your journey Formula is similar to " Troy " class hacker formula and just needs to deceive your operation;
B2, it avoids downloading nameless software and game formula from Internet as far as possible, even if downloading from well-known website Software also will in time with it is newest virus and wooden horse killing software software and system are scanned;
B3, password setting use alphanumeric as far as possible, and simple English or number are very easy to exhaustion, will commonly use Password be arranged different, prevent from being found one by people, related to arrive important password, important password is most preferably often replaced;
B4, support HTML BBS on, such as discovery submit warning, referring initially to source code, it is however very well possible to be defraud of password fall into Trap;
C, the safety of data: being carried out the transmission of data by network, need to guarantee the integrality and confidentiality of data, and When can to data sender carry out identity verifying, specific step is as follows for realization:
C1, One-Way Encryption is done to the data of data sender first, obtains the condition code of data;
C2, encryption generation specific code M1 is carried out with the private key of sender to the condition code obtained in C1;
C3, symmetric cryptography generation M2 is carried out to the M1 and data generated in C2;
C4, finally the password of the M2 generated in C3 and symmetric cryptography encrypted using the public key of recipient, to make It obtains the integrality confidentiality in the transmission process of data and can be protected to the verifying of sender's identity;
D, network hole reparation and inspection: periodically carrying out comprehensive loophole inspection to computer, understands computer system In the service that opens up and port, the loophole that understands the gimmick of current hacker attack and can be utilized, hacker invades work Tool detection, which checks, whether there is these loopholes in the computer system of oneself, discovery loophole is repaired in time;
E, the security protection of computer, including the following steps:
E1, a trustworthy antivirus software and firewall are installed in a computer, and during computer operation Forbid privately closing firewall and antivirus software, find there is virus in computer, should the antivirus of suspension immediately, must not make It is worked with viruliferous computer is taken, virus is avoided to spread through the internet to entire local area network;
E2, in company and enterprises so that computer be only used for writing material and utilize in-company office Domain net carries out inquiry data, must not watch movie using network, play game, chat and speculation in stocks;
E3, the computer for carrying and preserving the important confidential information of company should be applicable in fixed online IP, without permission, Internet must not be accessed without exception.
Preferably, after completing step C, when data reach recipient, recipient first use the private key of oneself to data into Row decryption, is obtained the data of password and encryption, encryption data is decrypted using password, the condition code sum number encrypted According to the public key decryptions condition code of sender, if it is possible to decrypt, then illustrate that the data are sent out by sender, it is on the contrary then not It is finally to be compared in the specific code for calculating the condition code of data and decrypting, be capable of detecting when whether data are repaired in this way Change.
Preferably, punishment system is carried out in company and enterprise: the employee of company and enterprise has act in violation of the stipulations One of, below discovery three times (including three times), 200 or less place is imposed a fine, and more than three times, company will release labor with the employee for discovery Dynamic circuit connector is same;
Preferably, during logging in website, as network tourist, the discrimination for constantly improving itself is needed to discover energy Power could more effectively protect oneself.
Preferably, before internet development is got up, viral propagation depends on floppy disc, and the present public frequently uses Movable storage device transmits file, these mobile devices become the important channel that wooden horse is propagated, and user should disable oneself of USB flash disk Dynamic playing function, the risk for avoiding movable storage device from contaminating.
A kind of network security monitoring and managing method proposed by the present invention, beneficial effect are the network supervision method from many aspects Corresponding solution is illustrated and proposed to danger present on network, can preferably solve the problems, such as network security, To avoid the infringement of virus, and to regulation is made that in the method using network of user, so as to effectively improve The safety and normalization that internet uses.
Specific embodiment
It is next combined with specific embodiments below that the present invention will be further described.
A kind of network security monitoring and managing method, includes the following steps:
A, the access control of network: access control is the important means of Protection of Network Security and protection, its main task It is maintenance network system security, guarantees that Internet resources are not illegally used and access very much, in technology realization, including it is following several A aspect:
A1, access control: access control provides first layer access control for network access, is network access Barrier at first, which user it, which controls, can log on to server and obtain Internet resources, control permit user-network access when Between and permit them and network in some specific work station, what is realized such as ISP service provider is exactly access service, the access visit of user Ask that control is the verifying to legitimate user, the authentication mode of user's the user name and password can be divided into three steps: user name Identification and verifying, the identification of user password and verifying and the default limitation inspection of user account;
A2, resources accessing control: being the access control management to object entirety resource information, including file system Access control (file directory access control and system access control), file attribute access control, information content access control, text Part directory access control refers to that user and user group are endowed certain permission, and under the rule control license of permission, which is used Family and which accessible catalogue of user group, subdirectory, file and other resources, which user can be to which texts therein Which kind of operation part, catalogue, subdirectory, equipment are able to carry out, and system access control refers to that a network system administrator is should be User specifies access authority appropriate, these access privilege controls access of the user to server, password locking clothes should be set Business device console should set server log time limit preventing illegal user's modification, deleting important information or destroying data System, time interval unauthorized access person detection and closed, reply network implementation monitoring, record access of the user to Internet resources, Illegal network is accessed, can use figure or text or form of sound alarm, file attribute access control, when with file, mesh Record and when the network equipment, should specify access attribute to file, catalogue, attribute security control can by given attribute with to access File, catalogue and the network equipment connect;
The access control of A3, the network port and node: node and port in network often encrypted transmission data, these are heavy The management of position is wanted to must be prevented from the attack that hacker starts, for managing and modifying data, it should be enough it is required that visitor provides Prove the validator of identity;
B, the attack-defending of internet worm, specifically includes the following aspects:
B1, of unknown origin Email and file are not opened arbitrarily, not run stranger at will to your journey Formula is similar to " Troy " class hacker formula and just needs to deceive your operation;
B2, it avoids downloading nameless software and game formula from Internet as far as possible, even if downloading from well-known website Software also will in time with it is newest virus and wooden horse killing software software and system are scanned;
B3, password setting use alphanumeric as far as possible, and simple English or number are very easy to exhaustion, will commonly use Password be arranged different, prevent from being found one by people, related to arrive important password, important password is most preferably often replaced;
B4, support HTML BBS on, such as discovery submit warning, referring initially to source code, it is however very well possible to be defraud of password fall into Trap;
C, the safety of data: being carried out the transmission of data by network, need to guarantee the integrality and confidentiality of data, and When can to data sender carry out identity verifying, specific step is as follows for realization:
C1, One-Way Encryption is done to the data of data sender first, obtains the condition code of data;
C2, encryption generation specific code M1 is carried out with the private key of sender to the condition code obtained in C1;
C3, symmetric cryptography generation M2 is carried out to the M1 and data generated in C2;
C4, finally the password of the M2 generated in C3 and symmetric cryptography encrypted using the public key of recipient, to make It obtains the integrality confidentiality in the transmission process of data and can be protected to the verifying of sender's identity, complete After step C, when data reach recipient, recipient is first decrypted data with the private key of oneself, obtains password and encryption Data, encryption data is decrypted using password, the condition code and data encrypted, it is special with the public key decryptions of sender Levy code, if it is possible to it decrypts, then illustrates that the data are sent out by sender, it is on the contrary then be not, finally in the feature of calculating data Code and the specific code decrypted compare, and are capable of detecting when whether data are modified in this way;
D, network hole reparation and inspection: periodically carrying out comprehensive loophole inspection to computer, understands computer system In the service that opens up and port, the loophole that understands the gimmick of current hacker attack and can be utilized, hacker invades work Tool detection, which checks, whether there is these loopholes in the computer system of oneself, discovery loophole is repaired in time;
E, the security protection of computer, including the following steps:
E1, a trustworthy antivirus software and firewall are installed in a computer, and during computer operation Forbid privately closing firewall and antivirus software, find there is virus in computer, should the antivirus of suspension immediately, must not make It is worked with viruliferous computer is taken, virus is avoided to spread through the internet to entire local area network;
E2, in company and enterprises so that computer be only used for writing material and utilize in-company office Domain net carries out inquiry data, must not watch movie using network, play game, chat and speculation in stocks;
E3, the computer for carrying and preserving the important confidential information of company should be applicable in fixed online IP, without permission, Internet must not be accessed without exception.
Punishment system is carried out in company and enterprise: the employee of company and enterprise has infringement, hair Now following three times (including three times), 200 or less place is imposed a fine, and more than three times, company will release labour contract, tool with the employee for discovery Behavior as defined in body is as follows;
(1), to the accident occurred in computer information system not by regulation report, cause data divulge a secret and virus in office It is spread in the net of domain;
(2), I or leave that other people in the computer of oneself play game, the amusement watching movie and chat using internet Behavior;
(3), do not unify installation antivirus software and firewall as requested, be turned off privately during the operation of computer Behavior;
(4), using the computer for carrying and preserving the important confidential information of company, accessing internet causes data to be divulged a secret And viral behavior in computer.
During logging in website, as network tourist, needs constantly to improve the discrimination diagnostic ability of itself, could more have The protection of effect oneself, before internet development is got up, viral propagation depends on floppy disc, and the present public is frequently using shifting Dynamic storage equipment transmits file, these mobile devices become the important channel that wooden horse is propagated, and user should disable the automatic of USB flash disk Playing function, the risk for avoiding movable storage device from contaminating.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to should be covered by the protection scope of the present invention with replacing or changing.

Claims (5)

1.一种网络安全监管方法,其特征在于,包括如下步骤:1. a network security supervision method, is characterized in that, comprises the steps: A、网络的访问控制:访问控制是网络安全防范和保护的重要手段,它的主要任务是维护网络系统安全、保证网络资源不被非法使用和非常访问,在技术实现上,包括以下几个方面:A. Network access control: Access control is an important means of network security prevention and protection. Its main task is to maintain network system security and ensure that network resources are not illegally used and accessed very much. In terms of technical implementation, it includes the following aspects : A1、接入访问控制:接入访问控制为网络访问提供了第一层访问控制,是网络访问的最先屏障,它控制哪些用户能够登录到服务器并获取网络资源,控制准许用户入网的时间和准许他们在具体某一个工作站入网;A1. Access access control: Access access control provides the first layer of access control for network access and is the first barrier to network access. It controls which users can log in to the server and obtain network resources, and controls the time and time when users are allowed to access the network. Allow them to access the network at a specific workstation; A2、资源访问控制:是对客体整体资源信息的访问控制管理,其中包括文件系统的访问控制(文件目录访问控制和系统访问控制)、文件属性访问控制、信息内容访问控制以及文件目录访问控制;A2. Resource access control: It is the access control management of the overall resource information of the object, including file system access control (file directory access control and system access control), file attribute access control, information content access control and file directory access control; A3、网络端口和节点的访问控制:网络中的节点和端口往往加密传输数据,这些重要位置的管理必须防止黑客发动的攻击,对于管理和修改数据,应该要求访问者提供足以证明身份的验证器;A3. Access control of network ports and nodes: nodes and ports in the network often encrypt and transmit data. The management of these important locations must prevent attacks launched by hackers. For managing and modifying data, visitors should be required to provide a validator sufficient to prove their identity. ; B、网络病毒的攻击防范,具体包括以下几个方面:B, network virus attack prevention, including the following aspects: B1、不要随意打开来历不明的电子邮件以及文件,不要随便运行陌生人给你的程式,类似于“特洛伊”类黑客程式就需要骗你运行;B1. Don't open emails and files from unknown sources at will, and don't run programs given to you by strangers. Hacker programs similar to "Troy" need to trick you into running; B2、尽量避免从Internet下载不知名的软件与游戏程式,即使从知名的网站下载的软件也要及时用最新的病毒和木马查杀软件对软件和系统进行扫描;B2. Try to avoid downloading unknown software and game programs from the Internet. Even if you download software from well-known websites, you should use the latest virus and Trojan killing software to scan the software and system in time; B3、密码设置尽可能使用字母数字混排,单纯的英文或数字非常容易穷举,将常用的密码设置不同,防止被人查出一个,连带到重要密码,重要密码最佳经常更换;B3. Use alphanumerics to set passwords as much as possible. Simple English or numbers are very easy to be exhausted. Set the commonly used passwords differently to prevent someone from finding one, and even to important passwords. It is best to change important passwords frequently; B4、在支持HTML的BBS上,如发现提交警告,先看原始码,非常可能是骗取密码的陷阱;B4. On the BBS that supports HTML, if you find a submission warning, look at the source code first, it is very likely to be a trap to defraud the password; C、数据的安全:通过网络进行数据的传输,需要保证数据的完整性以及保密性,及时能够对数据发送者进行身份的验证,实现具体的步骤如下:C. Data security: For data transmission through the network, it is necessary to ensure the integrity and confidentiality of the data, and to be able to verify the identity of the data sender in time. The specific steps are as follows: C1、首先对数据发送者的数据做单向加密,获取数据的特征码;C1. First, perform one-way encryption on the data of the data sender to obtain the characteristic code of the data; C2、对C1中获取的特征码用发送方的私钥进行加密生成特殊码M1;C2. Encrypt the feature code obtained in C1 with the sender's private key to generate a special code M1; C3、对C2中生成的M1与数据进行对称加密生成M2;C3. Symmetrically encrypt the M1 and data generated in C2 to generate M2; C4、最后将C3中生成的M2和对称加密的密码使用接收方的公钥进行加密,从而使得在数据的传输过程中的完整性保密性以及对发送方身份的验证都能够得到保障;C4. Finally, encrypt the M2 and the symmetric encrypted password generated in C3 with the public key of the receiver, so that the integrity and confidentiality of the data transmission process and the verification of the sender's identity can be guaranteed; D、网络漏洞修复以及检查:定期对计算机进行全面的漏洞检查,了解计算机系统中开设的服务以及端口,了解当前黑客攻击的手法以及可以被利用的漏洞,hacker入侵工具检测检查自己的计算机系统中是否存在这些漏洞,发现漏洞及时修补;D. Network vulnerability repair and inspection: Regularly conduct a comprehensive vulnerability inspection on the computer, understand the services and ports opened in the computer system, understand the current hacker attack methods and the vulnerabilities that can be exploited, and hacker intrusion tools to detect and check their own computer system. Whether these loopholes exist, and the loopholes are found and repaired in time; E、计算机的安全防护,包括以下几个步骤:E. Computer security protection, including the following steps: E1、在计算机中安装一个值得信赖的杀毒软件以及防火墙,并且在电脑运行期间禁止私自将防火墙以及杀毒软件关闭,发现计算机中存在病毒的,应立即断网杀毒,不得使用携带病毒的计算机进行工作,避免病毒通过网络传播至整个局域网;E1. Install a trustworthy anti-virus software and a firewall on the computer, and it is forbidden to turn off the firewall and anti-virus software without permission during the running of the computer. If a virus is found in the computer, the network should be disconnected immediately to kill the virus, and the computer carrying the virus should not be used for work. , to prevent the virus from spreading to the entire local area network through the network; E2、在公司以及企业内部,使得的计算机仅用于撰写材料以及利用公司内部的局域网进行查询资料,不得利用网络看电影、玩游戏、聊天以及炒股;E2. In the company and within the enterprise, the computer is only used for writing materials and using the company's internal local area network to query materials, and it is not allowed to use the Internet to watch movies, play games, chat or speculate in stocks; E3、携带以及保存有公司重要机密信息的计算机,应适用固定上网IP,未经允许,一律不得接入互联网。E3. Computers that carry and store important confidential information of the company should use a fixed Internet access IP, and must not access the Internet without permission. 2.根据权利要求1所述的一种网络安全监管方法,其特征在于,在完成C步骤后,当数据达到接收方时,接收方先用自己的私钥对数据进行解密,得到密码和加密的数据,使用密码对加密数据进行解密,得到加密的特征码和数据,用发送方的公钥解密特征码,如果能够解密,则说明该数据是由发送方所发,反之则不是,最后在计算数据的特征码和解密出来的特殊码作对比,这样能够检测出数据是否被修改。2. a kind of network security supervision method according to claim 1, is characterized in that, after completing C step, when data reaches receiver, receiver decrypts data with own private key earlier, obtains password and encryption Use the password to decrypt the encrypted data, obtain the encrypted feature code and data, and use the sender's public key to decrypt the feature code. The characteristic code of the calculated data is compared with the decrypted special code, which can detect whether the data has been modified. 3.根据权利要求1所述的一种网络安全监管方法,其特征在于,在公司以及企业中实行处罚制度:公司以及企业的员工有违反规定行为之一的,发现三次以下(包括三次),处200以下罚款,发现三次以上,公司将与该员工解除劳动合同。3. A kind of network security supervision method according to claim 1, it is characterised in that in the company and the enterprise implement a punishment system: the company and the enterprise's employees have one of the violations of regulations, found three times or less (including three times), A fine of less than 200 yuan will be imposed, and if found more than three times, the company will terminate the labor contract with the employee. 4.根据权利要求1所述的一种网络安全监管方法,其特征在于,在登陆网站过程中,作为网络游客,需要不断的提高自身的辨别察觉能力,才能更有效的保护自己。4. A kind of network security supervision method according to claim 1, is characterized in that, in the process of logging on to the website, as a network visitor, it is necessary to constantly improve one's own ability to distinguish and detect, so as to protect oneself more effectively. 5.根据权利要求1所述的一种网络安全监管方法,其特征在于,在互联网发展起来之前,病毒的传播依赖于软磁盘,现在公众频繁的使用移动存储设备传递文件,这些移动设备成为木马传播的重要通道,使用者应当禁用U盘的自动播放功能,避免移动存储设备染毒的风险。5. a kind of network security supervision method according to claim 1 is characterized in that, before the Internet develops, the spread of virus depends on floppy disk, and now the public frequently uses mobile storage devices to transfer files, and these mobile devices become Trojan horses to spread The user should disable the automatic playback function of the USB flash drive to avoid the risk of poisoning the mobile storage device.
CN201910076567.XA 2019-01-26 2019-01-26 A kind of network security monitoring and managing method Pending CN109600397A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910076567.XA CN109600397A (en) 2019-01-26 2019-01-26 A kind of network security monitoring and managing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910076567.XA CN109600397A (en) 2019-01-26 2019-01-26 A kind of network security monitoring and managing method

Publications (1)

Publication Number Publication Date
CN109600397A true CN109600397A (en) 2019-04-09

Family

ID=65966593

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910076567.XA Pending CN109600397A (en) 2019-01-26 2019-01-26 A kind of network security monitoring and managing method

Country Status (1)

Country Link
CN (1) CN109600397A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110443038A (en) * 2019-08-02 2019-11-12 贵州电网有限责任公司 A kind of portable ciphering type network security compliance automatic inspection device of desktop terminal
CN110881049A (en) * 2019-12-16 2020-03-13 淮安信息职业技术学院 Computer network safety intelligent control system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411926A (en) * 2016-11-03 2017-02-15 厦门安胜网络科技有限公司 Data encryption communication method and system
US20180053005A1 (en) * 2016-08-22 2018-02-22 Mastercard International Incorporated Method and system for secure device based biometric authentication scheme

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180053005A1 (en) * 2016-08-22 2018-02-22 Mastercard International Incorporated Method and system for secure device based biometric authentication scheme
CN106411926A (en) * 2016-11-03 2017-02-15 厦门安胜网络科技有限公司 Data encryption communication method and system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
健莲科技: "《宽带应用百事通》", 31 January 2003, 中国铁道出版社 *
商者: "网络传输数据的加密过程详解", 《MY.OSCHINA.NET》 *
牛少彰,崔宝江,李剑: "《信息安全概论》", 31 August 2016, 北京邮电大学出版社 *
邱永渠主编: "《中等职业教育教学探索 福建师范大学2006-2007年度中等职业学校专业骨干教师国家级培训论文集》", 30 November 2008, 浅析计算机网络安全与防范 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110443038A (en) * 2019-08-02 2019-11-12 贵州电网有限责任公司 A kind of portable ciphering type network security compliance automatic inspection device of desktop terminal
CN110881049A (en) * 2019-12-16 2020-03-13 淮安信息职业技术学院 Computer network safety intelligent control system
CN110881049B (en) * 2019-12-16 2022-02-15 淮安信息职业技术学院 Computer network safety intelligent control system

Similar Documents

Publication Publication Date Title
Shafiq et al. The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks
Greenberg et al. Mobile agents and security
Mohamed et al. Android vs iOS security: A comparative study
Herrmann et al. Basic concepts and models of cybersecurity
Mubeen et al. Strategies to Avoid Illegal Data Access
Almaiah et al. Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems.
Bishop et al. The threat from the net [Internet security]
WO2001073533A1 (en) System and method for safeguarding electronic files and digital information in a network environment
Robberts et al. Finding vulnerabilities in iot devices: Ethical hacking of electronic locks
Chuka-Maduji et al. Cloud computing security challenges and related defensive measures: A survey and taxonomy
Cordis et al. Considerations in mitigating Kerberos vulnerabilities for active directory
KR101042234B1 (en) How to prevent reading confidential documents of user program through location authentication
CN109600397A (en) A kind of network security monitoring and managing method
Krit et al. Review on the IT security: Attack and defense
Shetty et al. Survey of hacking techniques and it's prevention
CN117521052A (en) Protection authentication method and device for server privacy, computer equipment and medium
Lingamgunta Cyber Security For Beginners
Ali et al. Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence
Vinay et al. The Demonstration of Android Vulnerabilities
Liu Ethical Hacking of a Smart Video Doorbell
MA et al. Attacks and countermeasures in software system security
Udaykumar A study on Network Threats, Attacks & Security Measures
Soriano Information and network security
Tapiador Computer Security Fundamentals
Erike Dual combat technique-based cyber systems protection against password attacks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190409