计算机网络安全目录摘要..................................................................................................................................................2第一章网络安全基础...............................................................................................................31.1网络安全理论基础................................................................................................................3第二章计算机网络攻击的特点...............................................................................................42.1损失巨大...............................................................................................................................42.2威胁社会和国家安全............................................................................................................42.3手段多样,手法隐蔽...............................................................................................................42.4以软件攻击为主....................................................................................................................4第三章计算机网络安全存在的隐忧.......................................................................................43.1间谍软件:...........................................................................................................................43.2混合攻击:...........................................................................................................................53.3绕道攻击:...........................................................................................................................53.4强盗AP:..............................................................................................................................53.5蠕虫及病毒:.......................................................................................................................53.6网络欺诈:...........................................................................................................................53.7网络的分层设计原则:........................................................................................................53.8击键记录:...........................................................................................................................5第四章安全策略.......................................................................................................................64.1防火墙技术...........................................................................................................................64.2建立安全实时相应和应急恢复的整体防御........................................................................64.3阻止入侵或非法访问............................................................................................................64.4数据传输加密技术................................................................................................................64.5密钥管理技术.......................................................................................................................64.6加强网络安全的人为管理....................................................................................................7第五章网络安全的防范...........................................................................................................75.1...