计算机网络安全安全与防范摘要众所周知网络是世界上最复杂体系之一,网络布局中的计算机分支也十分复杂。这种复杂包括电脑主机与网络终端两者无法精确层次关系、系统无防御系统外界的可以随意查看其内部结构,同时这两者还造成,使用计算机进入网络查询信息的用户,因为计算机本生漏洞,最终变成带有病毒的软件和目的性黑客的攻击对象,一但攻克系统,这些恶意软件或是黑客则会通过我方计算机非法获取机密文件、攻击其它计算机,这些攻击造成的结果注定我们不愿面对。当今社会网络遍及家家户户,网络安全也越来越被重视,上网时自己获取的内容安全程度和保密程度显得尤为重要,但人们网络中浏览信息时,自我防范意识、防范措施等也不能缺少。关键词:计算机;网络;网络安全AbstractItiswellknownthatthenetworkisoneofthemostcomplexsystemsintheworld.Thiscomplexincludesmainframecomputersandnetworkterminalnotprecisehierarchy,systemnodefensesystemtoseeitsinternalstructureoftheoutsideworld,alsocausedthetwoatthesametime,usingthecomputerintothenetworkofinformationusers,becausethecomputerBunsenloophole,eventuallybecomewithvirussoftwareandpurposeofthehacker'sattackobject,butattacksystem,themalicioussoftwareorhackerwillthroughourcomputerillegalaccesstoconfidentialdocuments,attackothercomputer,theresultoftheseattacksaredestinedwedon'twanttoface.Today'ssocialnetworkthroughouteveryhousehold,networksecurityisalsomoreandmoreattention,Internetaccesstotheirowncontentsecurityandconfidentialityisparticularlyimportant,butwhenpeoplebrowseinformationinthenetwork,self-awareness,preventivemeasurescannotbelackof.Keywords:computer;Network;Networksecurity目录第一章引言...................................................................................................................................................1第二章网络安全的含义及重要性................................................................................................................1第一节网络安全的含义.......................................................................................................................1第二节网络安全的重要性...................................................................................................................1第三章网络安全的现状及主要影响因素....................................................................................................2第一节网络安全的现状.......................................................................................................................2第二节影响计算机网络安全的主要因素...........................................................................................2第四章常见的攻击方式................................................................................................................................3第一节间谍软件...................................................................................................................................3第二节混合攻击与绕道攻击...............................................................................................................3第三节强盗AP.....................................................................................................................................3第四节蠕虫及病毒...............................................................................................................................3第五节网络欺诈.........................................................................................................................