论文题目:计算机网络安全与防范摘要众所周知网络是世界上最复杂体系之一,网络布局中的计算机分支也十分复杂。这种复杂包括电脑主机与网络终端两者无法精确层次关系、系统无防御系统外界的可以随意查看其内部结构,同时这两者还造成,使用计算机进入网络查询信息的用户,因为计算机本生漏洞,最终变成带有病毒的软件和目的性黑客的攻击对象,一但攻克系统,这些恶意软件或是黑客则会通过我方计算机非法获取机密文件、攻击其它计算机,这些攻击造成的结果注定我们不愿面对。当今社会网络遍及家家户户,网络安全也越来越被重视,上网时自己获取的内容安全程度和保密程度显得尤为重要,但人们网络中浏览信息时,自我防范意识、防范措施等也不能缺少。关键词:计算机;网络;网络安全AbstractItiswellknownthatthenetworkisoneofthemostcomplexsystemsintheworld.Thiscomplexincludesmainframecomputersandnetworkterminalnotprecisehierarchy,systemnodefensesystemtoseeitsinternalstructureoftheoutsideworld,alsocausedthetwoatthesametime,usingthecomputerintothenetworkofinformationusers,becausethecomputerBunsenloophole,eventuallybecomewithvirussoftwareandpurposeofthehacker'sattackobject,butattacksystem,themalicioussoftwareorhackerwillthroughourcomputerillegalaccesstoconfidentialdocuments,attackothercomputer,theresultoftheseattacksaredestinedwedon'twanttoface.Today'ssocialnetworkthroughouteveryhousehold,networksecurityisalsomoreandmoreattention,Internetaccesstotheirowncontentsecurityandconfidentialityisparticularlyimportant,butwhenpeoplebrowseinformationinthenetwork,self-awareness,preventivemeasurescannotbelackof.Keywords:computer;Network;Networksecurity目录第一章引言.........................................................................................1第二章网络安全的含义及重要性......................................................1第一节网络安全的含义................................................................1第二节网络安全的重要性............................................................1第三章网络安全的现状及主要影响因素..........................................2第一节网络安全的现状................................................................2第二节影响计算机网络安全的主要因素....................................2第四章常见的攻击方式......................................................................3第一节间谍软件............................................................................3第二节混合攻击与绕道攻击........................................................3第三节强盗AP..............................................................................3第四节蠕虫及病毒........................................................................3第五节网络欺诈............................................................................4第六节击键记录............................................................................4第五章计算机网络安全的主要防御策略..........................................4第一节加强日常防护管理............................................................4第二节安装配置防火墙................................................................4第三节访问制约............................................................................5第四节信息加密............................................................................5第五节物理安全策略....................................................................5第六节技术层面对策....................................................................6结语语............