Current location - Training Enrollment Network - Books and materials - Network security handwritten newspaper materials
Network security handwritten newspaper materials
The network security manuscript is as follows:

1. Don't disclose yourself and your parents' family information, such as name, address, school, telephone number, photos, etc., to others online without your parents' consent.

2. If you see uncivilized information or pictures, you should inform your parents immediately.

3. Don't spread offensive remarks to others in chat rooms or BBS, and don't spread or repost other people's contents that violate the code of conduct of primary and secondary school students or even violate the law. Be a law-abiding citizen online and offline.

Try not to publish your email address in online forums, online bulletin boards and chat rooms. If you have more than one email address, try setting different passwords.

Don't meet people you know online without your parents' consent. If you decide to meet a net friend, you must do it with your parents' consent and company, or in a public place with your trusted classmates and friends.

6. If you receive junk mail (mail of unknown origin), delete it immediately. Including emails with greetings, prizes, etc. If in doubt, immediately ask parents and teachers how to deal with it.

7. Don't browse websites or websites that are not suitable for children. Even if you accidentally enter, you should leave at once.

8. If someone injures himself online, tell his parents or teachers in time.

9. According to the agreement with parents, properly control the online time, generally no more than 1 hour at a time.

First, cyber attacks.

1. Attacks on the network can be roughly divided into two categories: service supply and non-service attacks. Attacks can be divided into eight categories: system intrusion attack, buffer overflow attack, deception attack, denial of service attack, firewall attack, virus attack, Trojan horse attack and backdoor attack.

2. Application Dependent Attrack refers to an attack on a server that provides a certain service for the network, resulting in "denial of service" of the server and abnormal network work. At track's denial-of-service attack has the following effects: consuming bandwidth, consuming computing resources, and crashing systems and applications. , which prevents legitimate users of a service from accessing the services they have access to.

3. Application-independent Attrack is not aimed at specific application devices, but at the underlying protocols such as the network layer. This kind of attack often uses the loopholes in the protocol and operating system to achieve the purpose of the attack, which is a more hidden and dangerous attack means.

Second, information security.

Information security in 1. network mainly includes two aspects: information storage security and information transmission security.

2. Information storage security refers to how to ensure that information statically stored in networked computers will not be illegally used by unauthorized network users.

3. Information transmission security refers to how to ensure that information is not leaked and attacked during network transmission.

The main threats to information transmission security are: intercepting information, tampering with information and forging information.

The main technologies to ensure the information security of network system are data encryption and decryption.

Third, the problem of preventing denial.

Rejection prevention refers to how to prevent users of information sources from not acknowledging the information they sent afterwards, or not acknowledging the account after receiving the information. Authentication, digital signature, digital envelope and third-party confirmation are needed to ensure the legality of network information transmission and prevent denial.