ArithmetiqueCrypto

所属分类:防火墙与安全工具
开发工具:WORD
文件大小:14KB
下载次数:26
上传日期:2009-10-29 15:45:34
上 传 者jhp627
说明:  黑客攻击与防范 黑客常用的攻击步骤可以说变幻莫测,但纵观其整个攻击过程,还是有一定规律可循的,一般可以分:攻击前奏、实施攻击、巩固控制、继续深入几个过程。 目前比较流行的网络级安全防范措施是使用专业防火墙+入侵检测系统(IDS)为企业内部网络构筑一道安全屏障。防火墙可以有效地阻止有害数据的通过,而IDS 则主要用于有害数据的分析和发现,它是防火墙功能的延续。2者联动,可及时发现并减缓DoS、DDoS 攻击,减轻攻击所造成的损失。
(Hackers attack and to prevent common hacker attacks can be unpredictable steps, but throughout its entire course of the attack, there are still some rules to follow, and generally can be divided into: attack a prelude to implementation of the attack, to consolidate control, continue to penetrate several processes. Currently more popular network-level security measures is to use the professional firewall+ intrusion detection systems (IDS) for the enterprise internal network to build a security barrier. Firewall can effectively block the passage of bad data, while the IDS is mainly used for bad data analysis and discovery, which is a continuation of the firewall functionality. 2 person interaction, they can promptly detect and mitigate DoS, DDoS attacks, to reduce the losses caused by attacks.)

文件列表:
Arithmetique Crypto.doc (48640, 2007-07-20)

近期下载者

相关文件


收藏者