黑客技术

合集下载
相关主题
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

题目:黑客技术

学院:信息学院

专业:软件技术

姓名:刘小冬

学号: 1101100114 班级:信息B1121班

Abstract

Summary in today's information age, growing problem of network security, hacker attack and defense technology into today's network technologies and development focus of attention, with the development of networks, network security has become a strong concern is its hot spots. Hacker attacks as a result of security is one of the important aspects of the problem. This article describes the main threats to network security, focusing on the General steps for hacking, using means, as well as ways to address the latest measures.

Key words: network security ,threaten ,hacker ,the attack steps ,theory ,countermove

contents

First hackers and hacker technology (1)

(a)sources of hackers (1)

(b)The hacker technology (1)

Second Hackers attack (3)

(a)Attack technology (3)

(b)Defence hacker technology (4)

Third most common network security measures (5)

(a) Detection and prevention of network security (5)

(b) Timely data backup (5)

(c) The use of encryption mechanism in data transmission (6)

Fourth Peroration (6)

References (7)

First hackers and hacker technology

(a) sources of hackers

"Hacker" is a term coined by the English translation of the Hacker, is a specialized research, computer and network vulnerability of computer enthusiasts. They are accompanied by the development of computer and network have grown, hackers basically is a hobby, usually for their own interests, rather than to make money or work. The word "hacker" outside the circle or the media is usually defined as: dedicated to invade others system illegal computer master. But this kind of person in the eyes of hacker belongs to the lower level cracker (hackers).

The hacker began in the nineteen fifties, the earliest computer at the University of Pennsylvania in 1946, and the earliest hackers appeared in the Massachusetts academy, Baer laboratory have. The original hackers are generally some senior technical staff, they are keen to share in the challenge, advocating freedom and claim information.

(b)The hacker technology

Hacker technology, is on the computer system and network of flaws and vulnerabilities discovered, and the technical implementation of attacks against these defects. Here said the defects, including defects in software, hardware, network protocol flaws, defects management defects and human error. Obviously, hackers technical ability to network with destruction.

Engaged in illegal destruction activities for personal gain by hacker technology, behoove is spurned by the people's behavior. This kind of person not to focus on research and repair found on the system defects, but for some purpose to intrusion system, steal information, misappropriation of authority and implementation of sabotage. Can be said that the hacker technology exists to produce network security industry. Internet is based on the TCP/IP protocol, network equipment and operating system with networking capability. The TCP/IP protocol has some inherent design flaws, many even

相关文档
最新文档