Lord of Ashes - Chapter 1028
Gastroenteritis has not been cured. I have been relying on montmorillonite powder to harden it. Today I thought it was good, but I stopped the montmorillonite powder. After I stopped, I started to have diarrhea immediately… I feel that I will get stomach cancer after I get old. The probability should certainly be high.
So, I will update it later today, and then just refresh this chapter again.
…
Abstract: In order to improve the security of computer network engineering, this paper studies the security problems and countermeasures of computer network engineering, summarizes the connotation of computer network engineering security, and discusses it from the aspects of operating system and resource sharing, network protocols, and computer viruses. The computer network security problem is given and the solution strategy is given. It is concluded that the security of computer network engineering should be guaranteed from many aspects.
Keywords: computer; network engineering; security issues; countermeasures
In recent years, my country’s information technology has developed rapidly, and computer networks play an irreplaceable role in all walks of life in society. People can complete the timely and efficient transmission of various information by operating the computer network system, and complete various tasks without leaving home. However, the convenience that computer networks bring to people is based on the security of network engineering. If users do not pay attention to the security risks in computer network engineering, it is likely to provide an opportunity for network infringement and threaten computer information security. . Therefore, this paper discusses the security problems and countermeasures of computer network engineering.
1 Overview of computer network engineering security
At present, computer networks have been popularized in various fields of our society. For computer network engineering security, its specific meaning is relatively rich. For example, as far as business operators are concerned, their computer network engineering security protection system should be able to meet the requirements of protection Its various business information needs to be protected from being stolen; as far as individual users are concerned, the computer network engineering security protection system in their eyes is more focused on protecting the user’s own privacy and data security. But in general, the security of computer network engineering is a powerful guarantee for the security and stability of various businesses carried out by computer information systems and the integrity, validity and confidentiality of computer network information [1]. As far as the current situation of computer networks is concerned, computer data gradually presents an obvious trend of centralization, and the network environment also gradually presents an obvious trend of complexity, which brings a lot of risks to the information security of computer network engineering. Hidden danger. Especially in the initial stage of the construction of many computer network projects, engineers only comprehensively considered the adaptability and practicability of the network, and did not give deeper consideration to the security of the network. , Information security issues arise due to unreasonable factors in design, configuration, and application. Therefore, the construction of computer network engineering should not only ensure that it can implement timely and comprehensive recording and storage of various information data, but also provide sufficient network protection services, starting from hardware, software and other data information transmission media, from Technically guarantee the safety of computer network engineering.
2 Security issues in computer network engineering
2.1 Problems in computer operating system and resource sharing
The operating system is a key part of the computer, and has a non-negligible influence on the overall stability and safe operation of the computer. Therefore, it can be said that computer network security is closely related to the operating status of the operating system. If there is a problem with the operation of the computer operating system, it will be for the computer network. pose a major safety hazard. In current computers, the windows operating system of Microsoft Corporation is widely used, but the genuine version of this system is expensive, and many enterprises and individual users use pirated windows as the computer operating system, and these pirated operating systems Usually there is no sound security configuration, which may lead to some hidden dangers of network security. Various problems occur during the operation of the operating system, such as problems with system account management and port settings. The safety and stable operation of the system as a whole will bring adverse effects [2]. Computer resource sharing has a certain double-sidedness. While providing computer users with a steady stream of resources and sufficient convenience, it also brings security risks and seriously affects the security of computer network operations. As far as the concept of resource sharing itself is concerned, it mainly refers to a process of obtaining a variety of data information and resources through an open form. It can be seen that openness is its most prominent feature, which is why Internet resources such as Trojan horses and viruses Security killers provide an opportunity. In the case of sharing computer information resources, the privacy settings of computer users are relatively low, and malicious intruders can easily invade and destroy the user’s computer system through illegal means, especially invading and destroying the server of the computer, which brings great harm to the computer network. security risks. In addition, because resource sharing is also reflected in computer hardware, software, terminals, etc., malicious intruders can even start from the terminal and destroy computer hardware and software through illegal means, resulting in computer users being unable to use computers to complete various tasks normally. The transmission of items of information and data will bring losses to computer users.
2.2 Destruction with the help of tcp/ip network protocol
The coordinated operation of network protocols has an indispensable influence on the safe and stable operation of computer systems. At present, as far as the development of computer network technology is concerned, the application of tcp/ip protocol is very popular. However, in the process of designing a computer network system, designers often do not give comprehensive, comprehensive, and in-depth consideration to the openness, interconnectivity, and security of the computer network. It is especially easy to ignore the security of the computer network and set it as trusted. The network environment leads to insufficient security of the protocol itself, which brings security risks to the computer network and provides an opportunity for malicious intruders [2]. Malicious intruders can use the server of the computer to steal various important network resources, and even maliciously tamper with various information data of computer users, so that computer users cannot accurately complete the dissemination of various information data, such as intercepting connections and stealing IP addresses wait.
2.3 Computer virus problem
Computer virus problem is an important security risk of computer network. Computer viruses have certain similarities with biological viruses in reality, that is, they attach to computer files and infect other files in the computer through self-replication. This kind of virus transmission has a certain degree of secrecy, and computer users often cannot timely Discover. Computer users may be infected by viruses when they receive emails from unknown sources or browse some web pages. After the virus enters the computer, it will transmit the virus to other files of the user on the basis of self-replication, causing serious damage to the computer network. If the computer user does not use anti-virus software to clean up the virus in a timely and effective manner, there may be Cause the computer network system to be paralyzed. At present, with the continuous improvement of the computer technology level of virus programmers, computer viruses are still being updated and upgraded, which brings severe challenges to the update and optimization of antivirus software and the security of computer network engineering.
2.4 Security Issues Related to Cloud Computing
Users will also face certain security issues when applying different cloud computing service models or deploying cloud computing service models, which can be mainly divided into two aspects: cloud provider security issues and user security issues, but in general, not all The problems are all concentrated on the cloud provider or the user. The main responsibility of the cloud provider in this process is to ensure the stability and security of the cloud computing network infrastructure, while the user should set up a certain reliability authentication Password to keep your own data and cloud applications safe. When users save data in the public cloud or log in to the application, they should do a good job of hosting the information on the corresponding cloud server. However, under the background of artificial contradictions and increasingly prominent business competition, the threat to the user’s information security is more serious. From the perspective of technical security, a multi-user cloud environment is likely to cause serious computer network security problems. Different users are often isolated from each other and will not affect each other. However, in the context of the growing cloud era, these users are still It is possible to “drop in” intentionally or unintentionally, resulting in information leakage. For this part, the third-party platform is currently responsible for all data maintenance work, such as cloud encryption, digital certificate encryption, etc. Users can choose an appropriate encryption method according to the importance of their own data to maintain the security of Internet data transmission.
3 Solutions to computer network engineering security problems
3.1 Build a complete computer network security defense system
Aiming at the security problems existing in the current computer network engineering, a complete computer network security defense system should be further constructed. The details are as follows: (1) Set up a complete firewall to prevent hackers from accessing a complete firewall system can become a powerful guarantee for the security of computer network engineering. A firewall generally refers to a protective barrier composed of hardware and software devices, which is formed from the internal and external networks on the public network interface [3]. It is a typical network access control device that can build security between IRAs. The gateway realizes the powerful protection of the computer internal network, avoids hackers from invading, accessing the computer internal network, and maintains the security of the computer network. (2) Strengthen the intrusion detection system The intrusion detection system is also an important part of the computer network security defense system. Computer users can use the intrusion detection system to identify unwanted activities in a timely manner and impose certain restrictions on various computer activities to ensure the safe operation of the computer network. Computer users can also use a hybrid intrusion detection method to establish an intrusion detection system based on the network and the host, making the computer network security active defense system more three-dimensional, and realizing effective protection of the computer network. (3) Strengthen security scanning After setting up a complete firewall system and intrusion detection system, computer users should also regularly complete computer security scanning to strengthen the screening of loopholes and security problems existing in the operation of the computer system. Timely eliminate all kinds of security risks, repair loopholes, and ensure computer network security. (4) Optimizing the use of encryption technology Encryption technology is also an indispensable part of the computer network security defense system. The security level of its operating system is c1, c2, which can accurately identify computer users and effectively control their registration. And then maintain the security of the computer network. The large-scale database management systems used in the encryption technology are windowsnt and unix, which can effectively encrypt various sensitive data in the computer system, ensure that computer vulnerabilities will not be exploited by hackers and viruses, and that the database will not be damaged by illegal intruders , to ensure the accuracy of information data transmission, and then to ensure the security and stability of the computer network system.
3.2 Strengthen the prevention of computer viruses and repair loopholes in time
At present, under the background of continuous changes in computer network technology, computer network security issues are also showing a certain trend of complexity. In particular, computer viruses have an obvious trend of complexity, which can disguise themselves as difficult-to-recognize files and URLs to induce computer users. Click, browse, and spread the virus to other files on your computer. For increasingly complex computer viruses, it is also more difficult for antivirus software to detect and kill them. Therefore, in order to effectively prevent computer viruses, computer users should start from themselves and improve their awareness of virus prevention. Reduce the possibility of computer virus intrusion. At present, as far as our country is concerned, relatively mature computer anti-virus software includes kv300, kill, etc. Users can use anti-virus cards to realize dynamic monitoring of computers and find computer viruses in time. In addition, when loopholes are detected in the computer network system, computer users should fix the loopholes as soon as possible. All-round, multi-layered prevention of virus and hacker intrusion, maintaining the security of computer network.
3.3 Utilize the access control system to do a good job of storing and backing up the data
When dealing with various security issues in computer networks, computer users can use access control systems, that is, authentication systems and access control gateways, to effectively limit information resources in all aspects of computer networks. Specifically, when using various information resources in the computer network, computer users must pass identity authentication, which can ensure the accuracy and effectiveness of the resources used by computer users. Computer users should adopt effective methods to solve various problems existing in the computer network, make careful planning of computer network usage traffic, and continuously optimize and adjust according to the actual situation to ensure that computer network resources can be fully utilized. Take advantage of [4]. In addition, it is also possible to adjust the connection point with ACL function, restrict users with the help of ip address, and complete regular modification with administrator password, so as to avoid various threats to the computer network system during operation.