lijdrmy 发表于 2011-12-21 08:43

网络安全基础知识16个典型问答

<DIV>
<P class=MsoNormal style="MARGIN: 0cm 0cm 0pt; LINE-HEIGHT: 18.75pt; TEXT-ALIGN: left; mso-pagination: widow-orphan" align=left><STRONG><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">问:什么是网络安全</SPAN></STRONG><STRONG><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><FONT face="Times New Roman">?</FONT></SPAN></STRONG><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR><BR></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">  答:网络安全是指网络系统的硬件、软件及其系统中的数据受到保护,不因偶然的或者恶意的原因而遭到破坏、更改、泄露,系统可以连续可靠正常地运行,网络服务不被中断。</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR><BR></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">  <STRONG><SPAN style="FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">问:什么是计算机病毒</SPAN><SPAN lang=EN-US>?</SPAN></STRONG></SPAN><B><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR></SPAN></B><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">  答:计算机病毒(</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><FONT face="Times New Roman">Computer Virus</FONT></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">)是指编制者在计算机程序中插入的破坏计算机功能或者破坏数据,影响计算机使用并且能够自我复制的一组计算机指令或者程序代码。</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR><BR></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">  <STRONG><SPAN style="FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">问:什么是木马</SPAN><SPAN lang=EN-US>?</SPAN></STRONG></SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR><BR></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">  答:木马是一种带有恶意性质的远程控制软件。木马一般分为客户端(</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><FONT face="Times New Roman">client</FONT></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">)和服务器端(</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><FONT face="Times New Roman">server</FONT></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">)。客户端就是本地使用的各种命令的控制台,服务器端则是要给别人运行,只有运行过服务器端的计算机才能够完全受控。木马不会像病毒那样去感染文件。</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR><BR></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">  <STRONG><SPAN style="FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">问:什么是防火墙</SPAN><SPAN lang=EN-US>?</SPAN></STRONG><STRONG><SPAN style="FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">它是如何确保网络安全的?</SPAN></STRONG></SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR><BR></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">  答:使用防火墙(</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><FONT face="Times New Roman">Firewall</FONT></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">)是一种确保网络安全的方法。防火墙是指设置在不同网络(如可信任的企业内部网和不可信的公共网)或网络安全域之间的一系列部件的组合。它是不同网络或网络安全域之间信息的惟一出入口,能根据企业的安全政策控制(允许、拒绝、监测)出入网络的信息流,且本身具有较强的抗攻击能力。它是提供信息安全服务,实现网络和信息安全的基础设施。</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR><BR></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'"> <STRONG><SPAN style="FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'"> 问:什么是后门</SPAN><SPAN lang=EN-US>?</SPAN></STRONG><STRONG><SPAN style="FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">为什么会存在后门?</SPAN></STRONG></SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR><BR></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">  答:后门(</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><FONT face="Times New Roman">Back Door</FONT></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">)是指一种绕过安全性控制而获取对程序或系统访问权的方法。在软件的开发阶段,程序员常会在软件内创建后门以便可以修改程序中的缺陷。如果后门被其他人知道,或是在发布软件之前没有删除,那么它就成了安全隐患。</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR><BR></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">  <STRONG><SPAN style="FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">问:什么叫入侵检测?</SPAN></STRONG></SPAN><B><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR></SPAN></B><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">  答:入侵检测是防火墙的合理补充,帮助系统对付网络攻击,扩展系统管理员的安全管理能力(包括安全审计、监视、进攻识别和响应),提高信息安全基础结构的完整性。它从计算机网络系统中的若干关键点收集信息,并分析这些信息,检查网络中是否有违反安全策略的行为和遭到袭击的迹象</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR><BR></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">  <STRONG><SPAN style="FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">问:什么叫数据包监测</SPAN><SPAN lang=EN-US>?</SPAN></STRONG><STRONG><SPAN style="FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">它有什么作用?</SPAN></STRONG></SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR><BR></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">  答:数据包监测可以被认为是一根窃听电话线在计算机网络中的等价物。当某人在</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><FONT face="Times New Roman">“</FONT></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">监听</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><FONT face="Times New Roman">”</FONT></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">网络时,他们实际上是在阅读和解释网络上传送的数据包。如果你需要在互联网上通过计算机发送一封电子邮件或请求下载一个网页,这些操作都会使数据通过你和数据目的地之间的许多计算机。这些传输信息时经过的计算机都能够看到你发送的数据,而数据包监测工具就允许某人截获数据并且查看它。</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR><BR></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">  <STRONG><SPAN style="FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">问:什么是</SPAN><SPAN lang=EN-US>NIDS</SPAN></STRONG><STRONG><SPAN style="FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">?</SPAN></STRONG></SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><BR><BR></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">  答:</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><FONT face="Times New Roman">NIDS</FONT></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">是</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><FONT face="Times New Roman">Network Intrusion Detection System</FONT></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">的缩写,即网络入侵检测系统,主要用于检测</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><FONT face="Times New Roman">Hacker</FONT></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">或</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><FONT face="Times New Roman">Cracker</FONT></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">通过网络进行的入侵行为。</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><FONT face="Times New Roman">NIDS</FONT></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">的运行方式有两种,一种是在目标主机上运行以监测其本身的通信信息,另一种是在一台单独的机器上运行以监测所有网络设备的通信信息,比如</SPAN><SPAN lang=EN-US style="FONT-SIZE: 11pt; COLOR: #313131"><FONT face="Times New Roman">Hub</FONT></SPAN><SPAN style="FONT-SIZE: 11pt; COLOR: #313131; FONT-FAMILY: 宋体; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'">、路由器。</SPAN><B><SPAN lang=EN-US style="FONT-SIZE: 15pt; COLOR: #b20000; FONT-FAMILY: Arial"></SPAN></B></P></DIV>
页: [1]
查看完整版本: 网络安全基础知识16个典型问答