局域网毕业论文文献翻译中英文对照

上传人:无*** 文档编号:45838952 上传时间:2021-12-08 格式:DOC 页数:11 大小:65.50KB
收藏 版权申诉 举报 下载
局域网毕业论文文献翻译中英文对照_第1页
第1页 / 共11页
局域网毕业论文文献翻译中英文对照_第2页
第2页 / 共11页
局域网毕业论文文献翻译中英文对照_第3页
第3页 / 共11页
资源描述:

《局域网毕业论文文献翻译中英文对照》由会员分享,可在线阅读,更多相关《局域网毕业论文文献翻译中英文对照(11页珍藏版)》请在装配图网上搜索。

1、 外文资料及中文译文院系名称 信息科学与技术学院 学生姓名 学生学号 _ 200503013098 专业班级 _ 计科03- 7 指导教师 外文资料出处:计算机世界报 第03期 C20A LAN may be created based on a peering or a client-server. Small LANs are of ten created based on a simple peering relationship. Users may share resources and communicate with one another on a peer network,

2、but no single computer controls a peer network, and peer network users do not typically centralize files on one machine. As a rule, peer networks tend to lack organization and adequate security controls.The client-server architecture is usually used for sever controls network access and network reso

3、urces. Clients request resources from the server, and the server provides resources to clients. Servers may range in complexity from mainframes to PCs. Clients may range in complexity from PCs to display to terminals (DTS). Client-Server networks provide strong central security, centralized file org

4、anization and storage, and centralized data preservation. Compared to a peer network, a client-server network requires more centralized and specialized administration.Along with the rapid scientific and technological development, computer use in production as a proportion growing, increasingly play

5、a decisive role in the ministry, the office has computers, greatly facilitate the departments work, another demand gradually reveal themselves. That is the single transmission of information between. Computer networks should be established as soon as possible on the agenda. Establish computer networ

6、ks main purpose is to realize a resource sharing that all network users can enjoy the computer systems of all or part of the resources.LAN are currently used to broadcast the technical basis for Ethernet, any two nodes of communication between the data packet is not only these two nodes by the card

7、receipt, were also at the same Ethernet to the nodes of a network card by the interception, As long as hackers access to the Ethernet nodes for an interception, can capture the Ethernet in the data packet and all its packet analysis solution, thereby stealing critical information, This is the Ethern

8、et inherent security risks. In fact, many on the Internet free of the hacking tools are put Ethernet interception as the most fundamental means. A firewall is a network device that enforces security policy for network traffic. The term originates from firewall, a fireproof wall used as a barrier to

9、prevent the spread of fire. An Internet firewall creates a barrier between separate networks by imposing a point of control that traffic needs to pass before it can reach a different network. A firewall may limit the exposure of hosts to malicious network traffic, e.g., remote adversaries attempting

10、 to exploit security holes in vulnerable applications, by preventing certain packets from entering networks protected by the firewall.When inspecting a network packet, a firewall decides if it should drop or forward the packet. The decision is based on a firewalls security policy and its internal st

11、ate. Before forwarding a packet, a firewall may modify the packets content. Packet inspection may occur at several different layers: (1)The link layer provides physical addressing of devices on the same network. Firewalls operating on the link layer usually drop packets based on the media access con

12、trol (MAC) addresses of communicating hosts. (2)The network layer contains the Internet protocol (IP) headers that support addressing across networks so that hosts not on the same physical network can communicate with each other. (3)The transport layer provides data flows between hosts. On the Inter

13、net, the transmission control protocol (TCP) and the user datagram protocol (UDP) are used for this purpose. Most firewalls operate at the network and transport layer. TCP provides reliable data flow between hosts. UDP is a much simpler but unreliable transport protocol. (4)The application layer con

14、tains application specific protocols like the hypertext transfer protocol (HTTP). Inspection of application specific protocols can be computationally expensive because more data needs to be inspected and more states are required. A firewall is a piece of software or hardware that helps screen out ha

15、ckers, viruses, and worms that try to reach your computer over the Internet. If you are a home user or small-business user, using a firewall is the most effective and important first step you can take to help protect your computer. It is important to have a firewall and antivirus software turned on

16、before you connect to the Internet. If your computer is not protected when you connect to the Internet, hackers can gain access to personal information on your computer. They can install code on your computer that destroys files or causes malfunctions. They can also use your computer to cause proble

17、ms on other home and business computers connected to the Internet. A firewall helps to screen out many kinds of malicious Internet traffic before it reaches your system. Some firewalls can also help to prevent other people from using your computer to attack other computers without your knowledge. Us

18、ing a firewall is important no matter how you connect to the Internet dial-up modem, cable modem, or digital subscriber line (DSL or ADSL). The firewall product main bastion of the mainframe, packet-filtering router, Application Layer Gateway (Proxy), and Circuit Gateway, shielding mainframe firewal

19、ls, and other mainframe-type places. Although the firewall is to protect the network from hacker attacks effective means, but there are clearly inadequate: unable to prevent outside the firewall through other means of attack, not prevent defection from within and not attentive to the customers who b

20、rought the threat, able to completely prevent transmission of the virus has infected software or documents, and can not prevent data-driven attacks. Since 1986 digital companies in the United States to install the Internet world, a commercial fire Wall system, the concept of a firewall after firewal

21、l technology has made rapid development. Dozens of domestic and foreign companies launched the function of the firewall is not the same product range. 5 firewall at the network layer security system at the bottom of belonging to the network layer security technology areas. In this layer, the busines

22、s-to-security system raised of the question: whether all the IP can visit to the enterprises internal network? If the answer is yes, is illustrated in internal network has no network layer take preventive measures. As the internal network and external public network between the first barrier Firewal

23、l is the first by the peoples attention to the network security products in one. Although theoretically, firewall network security at the bottom, the network responsible for the security authentication and transmission, But with network security technology development and application of the network

24、changes, Modern technology has gradually firewall to the network layer other than the safety level, not only to complete the traditional firewall filtering tasks, but also for the various networks to provide the corresponding security services. In addition there is many other firewall products are m

25、oving towards data security and user authentication, anti-virus and hacker intrusion direction. SMEs in the specific network environment, in addition to HIV and the birthright of transmissibility, enforceability, and conventional destructive virus in common, but also have some other features: 1. Fas

26、ter rate of infection The spread of the virus must be some means for the complete closure of the single case; the virus is not from one computer to another computer transmission of. But the simple enterprise network environment, the spread of the virus can fully use the media, simple and rapid adopt

27、ion of the internal network, the virus can spread rapidly, for example: Common in the 100 M office network, as long as one is exposed workstations, can be in the tens of seconds to the same network of several hundred computers infected all. 2. Wide spread Infection of a particular LAN client Taiwan,

28、 and the client can also further infection of other network client (including servers) infected with the virus and the client can further infection more client (including a computer outside the LAN) so many cross-infection, the virus spread in the network, in addition to speed, its spread is quite a

29、mazing. 3. Dissemination in the form of complex and diverse Network forms of transmission of the virus before we have already done a presentation here would not elaborate on the But with computer viruses innovation, I believe there will be even more we can not predict the form of dissemination. 4. D

30、ifficult to eradicate Single of computer viruses can sometimes through anti-virus and virus deleted documents to resolve. If that does not work, such as low-level disk formatting can measure the complete removal of the virus. Network, as long as they have a workstation could not cleanse, the whole n

31、etwork can be re-infected with the virus, have just completed a work of the anti-virus workstations, it may be another virus Internet workstations are infected. Therefore, to deal with the single form of anti-virus, the LAN will be more pronounced, felt helpless. 5. Devastating SMEs office network i

32、s mainly for enterprise services. Virus attacks, the network will not only affect their normal work, and even more frightening is that it would collapse the network, damage to the computer network, so that work was ruined. 6. Sexual sparks It can be described as the hidden nature of the virus on the

33、 network extension, the network conditions for the virus to stimulate the diversification, it is the internal clock, the date and user name, it can also be a network of communication and so on. An HIV virus in accordance with the procedures designers, at the request of a workstation outbreak and spr

34、ead to the entire network. 7. Potential In the network, once infected with the virus, even if the virus has been eliminated, the potential danger is enormous. According to the companys network statistics, the virus has been removed, 85% of the 30 days will be re-infection. Enterprises still using si

35、ngle version of anti-virus software virus defense at the same time, virus has in various forms through the LAN to spread quickly, and they attacked the client, server, and gateway, almost all pervasive. it is not exaggerating to say, we can easily make the entire LAN gridlock, should we really have

36、to sit until death?Although the prospect of using virus technology to simplify the task of delivering patches and software updates is tempting, the dangers can outweigh the benefits when the process is too automated. For example, the improved Windows Update feature in Windows XP now allows patches a

37、nd updates to be downloaded automatically, although installation is still at the users discretion. Trojan horses, worms, and other malicious code forms have proven to be incredibly successful at paralyzing e-mail systems and Internet providers. It is therefore only logical to conceive of ways to use

38、 them for productive purposes, much as the Bible exhorts its readers to beat their swords into plowshares and their spears into pruning hooks. Granted, it would be wonderful if IT administrators could distribute patches and software updates to desktops and servers as quickly as an e-mail virus can s

39、pread from one machine to the next. But is such a magic wand really a good idea? Well, maybe not exactly. After all, unlike the human immune system, which produces defenses, or antibodies, automatically, the computer must wait for a human to analyze samples of a computer virus, prepare antidotes and

40、 vaccines for that specific situation, and only then apply the cure. This observation alone would seem to discredit the idea of a “digital immune system” that the security community has tossed around during the past few years, but theres an even more important point to consider. Similar to the way t

41、hat autoimmune diseases turn the body s own defenses against itself, so could one turn a viruslike software delivery system against its own computers. Although it would be difficult to monkey with the digital certificates that would conceivably be used to identify trusted patches, its not impossible

42、 to subvert the certificate issuing system.Viruses, worms, and Trojan horses are programs created by hackers that use the Internet to infect vulnerable computers. Viruses and worms can replicate themselves from computer to computer, while Trojan horses enter a computer by hiding inside an apparently

43、 legitimate program, such as a screen saver. Destructive viruses, worms, and Trojan horses can erase information from your hard disk or completely disable your computer. Others dont cause direct damage, but worsen your computers performance and stability.Antivirus programs scan email and other files

44、 on your computer for viruses, worms, and Trojan horses. If one is found, the antivirus program either quarantines (isolates) it or deletes it entirely before it damages your computer and files.Because new viruses are identified every day, its important to select an antivirus program with an automat

45、ic update capability. When the antivirus software is updated, it adds new viruses to its list of viruses to check for, helping to protect your computer from new attacks. If the list of viruses is out of date, your computer is vulnerable to new threats. Updates usually require an annual subscription

46、fee. Keep the subscription current to receive regular updates.Tips for using email and the web safely:(1)Use caution when opening email attachments. Email attachments (files attached to email messages) are a primary source of virus infection. Never open an attachment from someone you dont know. If y

47、ou know the sender but were not expecting an attachment, verify that the sender actually sent the attachment before you open it. See when to trust an email message and Avoiding email viruses.(2)Guard your personal information carefully. If a website asks for a credit card number, bank information, o

48、r other personal information, make sure that you trust the website and verify that its transaction system is secure. (3)Use the Phishing Filter in Internet Explorer. Phishing is the practice of creating fraudulent email messages and websites in order to trick computer users into revealing personal o

49、r financial information. The fraudulent email message or website appears to be from a trusted source, such as a bank, credit card company, or reputable online merchant. The Phishing Filter helps detect phishing websites to protect you from scams.(4)Be careful when clicking hyperlinks in email messag

50、es. Hyperlinks (links that open websites when you click them) are often used as part of phishing and spy ware scams, but they can also transmit viruses. (5)Only install add-ons from websites that you trust. Web browser add-ons, including ActiveX controls, allow web pages to display things like toolb

51、ars, stock tickers, video, and animation. However, add-ons can also install spy ware or other malicious software. If a website asks you to install an add-on, make sure that you trust it before doing so. 中文译文局域网可以基于对等式网络中,用户可以彼此共享资源和进行交流,但没有一台计算机对整个网络进行控制,对等式网络的用户一般也不将文件集中在一台机器上,通常对等网络往往缺少组织性和足够的安全控制

52、。客户机-服务器结构经常用于大型局域网或对安全性要求很高的局域网中。在客户机服务网络中,服务器控制网络的访问和网络的资源。客户机向服务器请求资源,服务器向客户机提供资源,从类型机到PC机,服务器的复杂程度各不相同。从PC机到显示终端(DTS),客户机的复杂程度也不相同。客户机服务器网络提供强大的中央安全控制,集中对文件进行组织和存储,并集中对数据进行保护。与对等网络相比,客户机服务器网络需要更多的集中管理和专门管理。目前局域网上都是采用以广播为技术基础的以太网,任何两个节点之间的通信数据包不仅被这两个节点的网卡所接收,也同时被处于同一以太网上的任一节点的网卡所截取,黑客只要接入以太网上的任一节

53、点进行侦听,就可以捕获发生在这个以太网上的所有数据包并对其进行解包分析,从而窃取关键信息,这就是以太网所固有的安全隐患。事实上,Internet上的很多免费的黑客工具都是把以太网侦听作为其最基本的手段。防火墙是一种网络设备,为网络的交通执行安全政策。这一术语来源于防火墙,防火墙作为防止火势蔓延的一道屏障。一个互联网防火墙造成障碍之间的单独网络设定点,控制交通需求,以通过才能达到不同网络。防火墙可以限制暴露主机恶意网络流量,例如,远程对手企图利用安全漏洞易受申请防止某些数据包进入网络保护的防火墙。当考察了网络数据包时,防火墙决定是否应该减少或转发数据包,这项决定是基于防火墙的安全策略及其内部状态

54、。在转发包以前,防火墙可以修改数据包的内容。包检查可能发生在几个不同的层次:(1)链路层在同一网络提供物理处理设备。防火墙运行在链路层,往往使得包难于与体访问控制(MAC)地址的主机沟通。(2)网络层包含的互联网协议(IP)报头,支持解决跨网络,使主机不在相同的物理网络上也与对方沟通。(3)运输层提供了数据流之间的主机。在因特网上传输控制协议(TCP)和用户数据报协议(UDP协议)是用于这一目的。大多数防火墙运行在网络和传输层。TCP协议在主机之间提供可靠的数据流,UDP协议是一个非常简单,但不可靠的传输协议。(4)应用层包含应用特定的协议,像超文本传输协议(HTTP),可以统计昂贵的特定应用

55、协议的检查,因为更多的数据需要加以检查,并有更多的国家所需。防火墙是一个软件或硬件,有助于筛选出黑客,病毒与蠕虫,设法让你的电脑接入因特网。如果你是一位家庭用户或小型企业用户,使用防火墙是最有效和最重要的第一步,它可以帮助您保护计算机。它是重要的,是有一个防火墙和防毒软体开启,然后连接到互联网上的。 如果你的电脑是没有保障,当您连接到互联网,黑客在您的计算机上可获取个人资料。他们可以安装程序码输入电脑,销毁档案或导致故障。其他家用和商用电脑连接上互联网,他们也可以使您的电脑造成问题。在到达你的系统之前,防火墙有助于筛选出多种恶意网络流量。没有你的知识,部分防火墙也能防止其他人使用你的电脑攻击其

56、他电脑。使用防火墙重要的是你是怎样连接到互联网拨号调制解调器,电缆调制解调器,或数字订户线路(DSL或ADSL的)。目前的防火墙产品主要有堡垒主机、包过滤路由器、应用层网关(代理服务器)以及电路层网关、屏蔽主机防火墙、双宿主机等类型。虽然防火墙是目前保护网络免遭黑客袭击的有效手段,但也有明显不足:无法防范通过防火墙以外的其它途径的攻击,不能防止来自内部变节者和不经心的用户们带来的威胁,也不能完全防止传送已感染病毒的软件或文件,以及无法防范数据驱动型的攻击。自从1986年美国Digital公司在Internet上安装了全球第一个商用防火墙系统,提出了防火墙概念后,防火墙技术得到了飞速的发展。国内

57、外已有数十家公司推出了功能各不相同的防火墙产品系列。防火墙处于5层网络安全体系中的最底层,属于网络层安全技术范畴。在这一层上,企业对安全系统提出的问题是:所有的IP是否都能访问到企业的内部网络系统?如果答案是“是”,则说明企业内部网还没有在网络层采取相应的防范措施。作为内部网络与外部公共网络之间的第一道屏障,防火墙是最先受到人们重视的网络安全产品之一。虽然从理论上看,防火墙处于网络安全的最底层,负责网络间的安全认证与传输,但随着网络安全技术的整体发展和网络应用的不断变化,现代防火墙技术已经逐步走向网络层之外的其他安全层次,不仅要完成传统防火墙的过滤任务,同时还能为各种网络应用提供相应的安全服务

58、。另外还有多种防火墙产品正朝着数据安全与用户认证、防止病毒与黑客侵入等方向发展。在中小型企业网络的特定环境下,病毒除了与生俱来的可传播性、可执行性、破坏性等常规病毒的共性外,还具有一些其他的特点:1、感染速度快病毒的传播必须要一定的途径,在完全封闭的单机情况下,病毒是无法从一台计算机传给另一台计算机的。不过在企业简单的网络环境下,病毒的传播可以利用充分的介质,通过简单而快速的内部网络,病毒可以迅速地传播,举个例子:在常见的100m办公网络内,只要有一台工作站染毒,就可在几十秒钟内将同一网络中的数百台计算机全部感染。2、扩散面广病毒感染了局域网中某一台客户机,而客户机又可以进一步感染网络中的其他

59、客户机(也包括服务器),而感染了病毒的客户机又可以更进一步的感染更多客户机(也包括了局域网以外的计算机)如此反复交叉感染,病毒在网络中扩散时,除了速度快以外,其扩散范围也相当惊人。3、传播的形式复杂多样网络内病毒的传播形式前面我们已经做了介绍,这里就不再详细说明,不过随着计算机病毒的推陈出新,相信还会有更多的我们所无法预计的传播形式。4、难于彻底清除单机上的计算机病毒有时可以通过杀毒和删除带毒文件来解决。如果还不行,低级格式化硬盘等措施总能将病毒彻底清除。而网络中只要有一台工作站未能清除干净,就可使整个网络重新被病毒感染,甚至刚刚完成杀毒工作的一台工作站,就有可能被网上另一台带毒工作站所感染。

60、因此,以对付单机形式的杀毒方法,在局域网内会显得捉襟见肘,心有余而力不足。5、破坏性大中小型企业的办公网络,主要就是为企业的工作服务。受到病毒袭击后,不但影响网络正常的工作,而更可怕的是它会使网络崩溃,破坏网络中计算机的数据,使工作成果毁于一旦。6、可激发性它可以称得上是病毒的隐蔽性在网络上的延伸,网络病毒激发的条件多样化,可以是内部时钟、系统的日期和用户名,也可以是网络的一次通信等等。一个病毒程序可以按照病毒设计者的要求,在某个工作站上爆发,并传播给整个网络。7、潜在性在网络中,一旦感染了病毒,即使病毒已被清除,其潜在的危险性也是巨大的。根据对企业的网络统计,病毒被清除后,85%的会在30天

61、内会被再次感染。企业还在使用单机版杀毒软件来防御病毒的同时,病毒却在以多种形式借助局域网迅速传播,它们攻击客户端、服务器、网关,几乎无孔不入,不夸张地说,轻而易举地就可以使整个局域网陷于瘫痪,难道我们真的要坐已待毙吗?虽然利用病毒技术来简化提交补丁和软件升级任务的前景很诱人,但当这个过程过于自动化时,危险性可能超过好处。例如,Windows XP改进的Windows更新功能允许自动地下载补丁和更新,虽然是否安装仍由用户决定。 特洛伊木马、蠕虫和其他恶性程序代码形式,也已证明在瘫痪电子邮件系统和因特网供应商方面是非常成功的。因此,设想为提高生产率而使用它们仅仅只是逻辑上的,这非常像圣经告诫读者要

62、化干戈为玉帛。 当然,IT管理员若能像电子邮件病毒从一台机器传播到另一台机器那样,快速地把补丁和软件更新分发给台式机和服务器,那就再好不过了。但是这样的魔杖真的是一个好主意吗? 可能不完全是这样。毕竟计算机和人的免疫系统不一样,不能自动产生防御,即抗体,计算机必须等待人来分析计算机病毒的样本,为这个特定的病毒制备解毒剂和疫苗,然后才能用于治病。 此看法好像在怀疑“数字免疫系统”的设想,而在过去几年里安全界已经在争论这种数字免疫系统,但是,还有更重要的一点要考虑。与使疾病自动免疫的方法很类似,即调动体内自己的防御抵抗疾病,人们也能调动像病毒那样的软件提交系统针对自己的计算机。虽然乱用识别是不是可

63、信的补丁的数字认证是困难的,但毁坏认证颁发系统也不是不可能的。黑客利用病毒、蠕虫、特洛伊木马程序通过互联网来侵袭电脑。病毒和蠕虫可以从一台计算机上复制到另一台计算机上,而特洛伊木马病毒进入电脑躲藏看似合法的程序,例如一个屏幕保护程序。破坏性的病毒,蠕虫,特洛伊木马病毒能够从硬盘删除信息或完全关闭你的电脑。对别人不会造成直接的损害,但会恶化你的电脑的性能和稳定性。防毒程序扫描电子邮件和其他文件,如计算机病毒、蠕虫、特洛伊木马程序。 如果人们发现的防毒程序或是检疫或删除,它完全是在破坏你的电脑档案。 由于新病毒的发现,每天选择防毒程序的自动更新能力是重要的。防毒软件的更新,增加了新的病毒列入名单的

64、病毒检查,帮助保护您的计算机免受新的攻击。如果名单上的病毒是过时了,您的电脑很容易受到新的威胁。更新通常需要每年订阅费,保持现行认购以接受定期更新。小贴士使用电子邮件和Web安全(1)谨慎使用打开电子邮件的附件。电子邮件的附件(文件附在电子邮件讯息)是病毒感染的一个主要来源。你不知道从未公开扣押别人,如果你知道寄件人,但并没有期待扣押,核实发送实际上发出扣押之前你打开它,当看到信任的电子邮件讯息时,就避免电子邮件病毒。(2)守卫你的个人详细资料。如果一个网站要求提供信用卡号码、银行信息或其它个人信息,确保您信任的网站,应核实其交易系统是安全可靠的。 守卫你的个人详细资料。如果一个网站要求提供信用卡号码、银行信息或其它个人信息,确保您信任的网站,应核实其交易系统是安全可靠的。 (3)使用仿冒过滤器Internet Explorer。仿冒是实践创造欺骗性电子邮件信息和网站以欺骗电脑用户透露个人或财务信息。欺诈性电子邮件信息或网页似乎是从一个可信赖的来源,例如银行、信用卡公司或信誉良好的网上商家。仿冒的过滤有助于侦测仿冒网站,以保障你的陷阱。(4)小心点击链接在电子邮件讯息。链接(当你点击公

展开阅读全文
温馨提示:
1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
2: 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
3.本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!