Network Security Vulnerabilities and Preventive Measures

Article Preview

Abstract:

As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1674-1678

Citation:

Online since:

October 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] SEAN CONVERY, CCIE NO. 4232. NETWORKS SECURITY ARCHITECTURES[M]. the posts and Telecommunications Press, 2005(in Chinese).

Google Scholar

[2] ALLAN LISKA, THE PRACTICE OF NETWORK SECURITY[M]. Machinery Industry Press, 2004(in Chinese).

Google Scholar

[3] JOEL SCAMBRAY&STUART MCCLURE&GEORGE KURTZ. HACKING EXPOSED; NETWORK SECURITY & SOLUTIONS[M]. Tsinghua University press, 2002(in Chinese).

Google Scholar

[4] Yongmei Lei, Lin Zhao. Computer network security technology and security technology of [M]. Tsinghua University press, 2006(in Chinese).

Google Scholar

[5] Xiren Xie. Computer network [M]. Dalian University of Technology press, 2006(in Chinese).

Google Scholar

[6] Guozhi Lu. A new introduction to e-commerce [M]. Peking University Press, 2005(in Chinese).

Google Scholar

[7] Fuguo Yang, Zhijun Lv. The network security and firewall [M]. Tsinghua University press, 2005(in Chinese).

Google Scholar

[8] Xinhua Wu, Changlin Zhai. Hacker defense technology foreign [M]. Tsinghua University press, 2006(in Chinese).

Google Scholar

[9] Zhiguang Qin, Fengli Zhang. The theory of computer virus and prevention of [M]. Tsinghua University press, 2007(in Chinese).

Google Scholar

[10] Zhiguo Shi, Weimin Xue, Hao Yin. Computer network security tutorial [M]. Tsinghua University press, 2007(in Chinese).

Google Scholar