在线安全检测系统设计

Hongyan Han
{"title":"在线安全检测系统设计","authors":"Hongyan Han","doi":"10.18063/PHCI.V1I1.762","DOIUrl":null,"url":null,"abstract":"The 21st century is the information age, information has become an important strategic resource for social development, social information has become the development trend of the world today and the core, and information security in the information society will play a very important role. With the continuous development of computer networks, global information has become the trend of human development. However, because the computer network has the form of connection diversity, terminal distribution inhomogeneity and network openness, interconnection and other characteristics, resulting in the network vulnerable to hackers, malware and other malicious attacks, the former will cause unpredictable impact on the user , While the latter often causes the system to crash. Whether in the local area network or in the wide area network, there are natural and man-made and many other factors of vulnerability and potential threats. Therefore, the network security measures should be able to all aspects of a variety of threats and vulnerabilities, so as to ensure the confidentiality of network information, integrity and availability.  A t t h e beginning of this article, the beginning of this article, through the analysis of hacker behavior and typical attacks, summarizes the inevitable reasons for the existence of network security vulnerabilities, and summarizes the status of computer network security, as well as the specifi c concepts, classifi cation and limitations of vulnerability scanning technology. The focus of this paper is to improve the original system of the theme module, and the original system to add some features to make it more perfect function. Finally, the shortcomings of the system and some suggestions for further improvement and expansion are put forward.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Online security detection system design\",\"authors\":\"Hongyan Han\",\"doi\":\"10.18063/PHCI.V1I1.762\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The 21st century is the information age, information has become an important strategic resource for social development, social information has become the development trend of the world today and the core, and information security in the information society will play a very important role. With the continuous development of computer networks, global information has become the trend of human development. However, because the computer network has the form of connection diversity, terminal distribution inhomogeneity and network openness, interconnection and other characteristics, resulting in the network vulnerable to hackers, malware and other malicious attacks, the former will cause unpredictable impact on the user , While the latter often causes the system to crash. Whether in the local area network or in the wide area network, there are natural and man-made and many other factors of vulnerability and potential threats. Therefore, the network security measures should be able to all aspects of a variety of threats and vulnerabilities, so as to ensure the confidentiality of network information, integrity and availability.  A t t h e beginning of this article, the beginning of this article, through the analysis of hacker behavior and typical attacks, summarizes the inevitable reasons for the existence of network security vulnerabilities, and summarizes the status of computer network security, as well as the specifi c concepts, classifi cation and limitations of vulnerability scanning technology. The focus of this paper is to improve the original system of the theme module, and the original system to add some features to make it more perfect function. Finally, the shortcomings of the system and some suggestions for further improvement and expansion are put forward.\",\"PeriodicalId\":299144,\"journal\":{\"name\":\"Progress in Human Computer Interaction\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Progress in Human Computer Interaction\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.18063/PHCI.V1I1.762\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Progress in Human Computer Interaction","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18063/PHCI.V1I1.762","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

21世纪是信息时代,信息已成为社会发展的重要战略资源,社会信息化已成为当今世界的发展趋势和核心,而信息安全在信息社会中将发挥非常重要的作用。随着计算机网络的不断发展,全球信息化已成为人类发展的趋势。然而,由于计算机网络具有连接形式的多样性、终端分布的非同质性以及网络的开放性、互联性等特点,导致网络容易受到黑客、恶意软件等恶意攻击,前者会对用户造成不可预知的影响,而后者往往会导致系统崩溃。无论是在局域网还是在广域网中,都存在着自然和人为等诸多因素的脆弱性和潜在威胁。因此,网络安全措施应能够防范各方面的各种威胁和漏洞,从而保证网络信息的保密性、完整性和可用性。在本文的开头,本文通过对黑客行为和典型攻击的分析,总结出网络安全漏洞存在的必然原因,并总结了计算机网络安全的现状,以及漏洞扫描技术的具体概念、分类和局限性。本文的重点是对原有系统的主题模块进行改进,并在原有系统的基础上增加一些功能,使其功能更加完善。最后,提出了系统存在的不足和进一步完善和扩展的建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Online security detection system design
The 21st century is the information age, information has become an important strategic resource for social development, social information has become the development trend of the world today and the core, and information security in the information society will play a very important role. With the continuous development of computer networks, global information has become the trend of human development. However, because the computer network has the form of connection diversity, terminal distribution inhomogeneity and network openness, interconnection and other characteristics, resulting in the network vulnerable to hackers, malware and other malicious attacks, the former will cause unpredictable impact on the user , While the latter often causes the system to crash. Whether in the local area network or in the wide area network, there are natural and man-made and many other factors of vulnerability and potential threats. Therefore, the network security measures should be able to all aspects of a variety of threats and vulnerabilities, so as to ensure the confidentiality of network information, integrity and availability.  A t t h e beginning of this article, the beginning of this article, through the analysis of hacker behavior and typical attacks, summarizes the inevitable reasons for the existence of network security vulnerabilities, and summarizes the status of computer network security, as well as the specifi c concepts, classifi cation and limitations of vulnerability scanning technology. The focus of this paper is to improve the original system of the theme module, and the original system to add some features to make it more perfect function. Finally, the shortcomings of the system and some suggestions for further improvement and expansion are put forward.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信