信息检索课题研究李天鑫

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

baidu
SDOS
IEEE
ARL
中国知网
原文搜索过程
期刊原文:Building a Safety Net ; Enterprise computer security is everybody's business.









Who is responsible for the latest rounds of virus and worm attacks? While speculation includes the usual suspects intelligent but twisted coders - the list has also lengthened to include digital terrorists. While we may never know who is responsible, the bigger question for technology professionals is who is responsible for keeping those viruses and worms away from your company's IT infrastructure. The answer is everyone: vendors, end users and system administrators. Everyone needs to own up to responsibility, or businesses will be suffocated under a continuing worm and virus onslaught. Vendors, Microsoft in particular, are everyone's favorite blame target. Next January will mark the two-year anniversary of Bill Gates' memo outlining the company's Trustworthy Computing strategy, in which Gates said that from that time on, the company would give priority to security over new features in upcoming products. That initiative was not inspired by altruism, but by the recognition that as Microsoft marketed to a Windows environment ranging from tiny mobile devices to huge enterprise servers, the company's fortunes would rise or fall with the level of customer trust. The upcoming announcement this fall of Office 2003 will be an opportune time for Gates to explain how Trustworthy Computing is faring in the face of continued virus attacks that leave end users with systems tangled and useless. The current process of posting and pushing fixes via the Web is not working. Users can't be counted on to install the patches, and system administrators can't be expected to allow patches to be installed without some testing to see what effects those patches will have on their networks. In a recent phone interview, Steven Sinofsky, Microsoft's senior vice president for Office, said, "The Microsoft Office [2003] design is the most secure system we can design." It had better be, as the next version of Office transforms the product from an integrated desktop productivity suite to an application integration platform for tying companies closer to customers and suppliers. Office users I've spoken with are unanimous in asking that Microsoft explain and defend its Trustworthy Computing road map before extolling the integration benefits of the new Office platform. "In light of this week's virus-related issues, we have chosen to delay our deployment of Office '03," said an eWEEK Corporate Partner, asking to remain anonymous to keep competitive vendor calls to a minimum. "We had planned to release a qualified Win XP/Office '03 build onto new computers and gradually deploy to the rest of the corporation. What we have decided is that we need a much more robust Win2K environment before we can do the gradual migration." "How can anyone responsible for infrastructure allow tighter collaboration without solid security? The rapidity with which the latest round of worms spread was amazing," said Kevin Baradet, chief technology officer at the Johnson Graduate School of Management at Cornell University and another Corporate Partner. "At this point, I would be very reluctant to turn on any of these collaboration features unless I could be sure that the productivity gained was significantly greater than the costs of cleaning up after an incident." In this case, customers are doing the right thing in demanding upfront that a vendor address the security issue. The virus problem will not be solved by finger-pointing after the fact, but by being proactive in addressing the problem. Of course, being proactive is difficult when your servers are crashing under the latest virus attack or you have end users who habitually open unknown files and carry laptops that live in both protected corporate environments and wide-open home and travel environments. And it would be good to see hardware vendors spending as much effort to provide systems that can be easily and visibly locked down as they do promoting systems that have the latest displays and huge storage capacity. In the end, all those touched by a computer virus are responsible for setting up an environment where the next virus will be kept at bay. Until that responsibility is shared by all, the next virus making the rounds will continue to make a mockery of the current state of security

关键词
1、计算机 computer 2、网络 Network 3、安全 Security

检索式
中文:(计算机+网络)*安全 英文:(computer+ Network)* Security

调查重点:
近年来计算机网络的安全情 况
数据库的选择
BAIDU google SDOS IEEE ARL 中国知网
信息检索课题研究
李天鑫 20055073 刘广益 20055081 何飙 2ቤተ መጻሕፍቲ ባይዱ055181

课题名称:
计算机网络安全
课题背景及选择意义:
由于近年来计算机系统漏洞的发现速度加快, 大规模蠕虫攻击不断爆发,计算机网络安全状况不 容乐观. 目前的计算机网络攻击具有攻击源相对集中, 攻击手段更加灵活,攻击对象的范围扩大等新特点. 虽然现在的网络安全技术较过去有了很大进步,但 计算机网络安全是攻击和防御的技术和力量中此 消彼长中的一个动态过程,整体状况不容乐观.网 络安全企业和专家应该从这些特点出发,寻找更好 的解决之道.
相关文档
最新文档