In the Internet vigorous development today, the network security question more and more is valued people's, but the hacker attack is creates the network security problem the primary cause, along with hacker technology development, network attack method diversification, virtually impossible to guard against, the information and the network security question more and more many receives the various countries' government, the scientific research institution widespread attention.The analysis studies the method which the hacker moves and uses the technology, to sharpens the active defense ability, the enhancement network security construction, prevented the network crime has the very good model function, and also has the vital significance in the network security event emergency response research. The network information security is facing the enormous threat and the challenge.The military commander has the word, knows oneself and the other side, is undefeated in many battles, carries on the reasonable appraisal to the network security condition, carries on the full understanding and the perspective research to the network attack behavior is maintains the initiative key in the network attack and defense resistance. The traditional safe protection method firewall, the invasion examination, the security loophole scanned, the hypothesized private network and so on wage the struggle in the same network hacker in the process to play the huge role, but in the network attack which emerged one after another incessantly (unknown attack front these traditional safe defensive measure appears in particular) somewhat lacks the ability to do what one would like, was in the passive region gradually. The present paper from the analysis network origin and the development, to the common operating system loophole and the method of attack, as well as Windows aspects and so on Internet server safe disposition practice, narrated the network attack common way as well as the basic guard measure.
温馨提示:答案为网友推荐,仅供参考