Vous êtes sur la page 1sur 4

2012 IEEE Symposium on Robotics and Applications(ISRA)

Computer Network Security Issues and CountermeasureV

Liu Chunli ,Liu DongHui


Department of Computer Engineering CangZhou Normal College ,CangZhou Hebei, 061000,China
chunliwl@163.com

Abstract—The 21st century is the era of the Internet, featured and influence on the network in terms of transmission lines
by rapid development and application of computer network on the one hand and the stability of the network on the other
technology. Security issues also present themselves hand. In addition, magnetic field and high power can destroy
accompanying the emergence of computer networks. To tackle data information transmitted in the network. Since network
these issues, we must come up with countermeasures. In this usually passes data and information through wired link or
article, the author firstly analyzes the security and reliability radio waves, it is also vulnerable to lightning. During a
issues existing in computer networks, and then proposes some lightning storm, network security issues can easily arise,
opinions on how to deal with the current computer network because lightning can pass through the cable easily, damage
security issues, aiming to discuss this together with extensive
computers in the network along the cable, and sometimes
customers in order to enhance the awareness of computer
network security protection.
even lead to paralysis of the entire computer network. In
social environment, there are also factors that affect network
Keywords- computer; network security; issues; security and man-made damages, resulting in destructive
countermeasures blow to the network system.
With the increasingly stronger demand for opening and B. Resource sharing
sharing network information resources, more and more Existing network has increasingly high requirements for
people start using network resources, and the network size is resource sharing, including hardware, software and data
constantly expanding. However, hidden insecurity factors are sharing. Both terminal-terminal and terminal-server resource
also increasing. Network security accident is not uncommon sharing is required, so users can quickly access network
any more, and the number of accidents and losses also grow information even if they are in a different place, very
exponentially. In the network, there are a lot of viruses and convenient. However, at the same time, this convenient
hackers damaging network security, and some deliberate process also presents some “opportunities” for some ill-
cyber crimes impose huge threats to information security. intentioned people and many illegal users may take
Computer network security is now a problem faced by every advantage of certain loopholes to steal or destroy information.
person using the computer network, and an integrated For certain purposes, some illegal users sometimes may
systematic engineering, so we should consider it from a conduct illegal browsing and illegal modification through the
long-term perspective and carry out long-term exploration terminal or node, imposing threats to the accuracy of data or
and planning. information obtained. In addition, computer's own hardware
or software failure can also cause network security problems,
I. COMPUTER NETWORK SECURITY ISSUES resulting in undesired disclosure. Moreover, since most of
In computer networks, there are a variety of insecurity the network transmission has to pass through a certain
factors. We can say that nowadays, computer technology and distance, there will be certain time difference between
network technology has become an integral part of people’s resources available for sharing on the network and the actual
life. At the same time, various problems have also cropped use by users, such as network printers. In such distance,
up. New insecurity factors are constantly emerging. In this network security issues may also arise, providing convenient
article, the author summarizes and finds out that insecurity temporal and spatial conditions for illegal theft of
factors mainly lie in the following eight aspects. information. [2]
A. Environment C. Data communication
Computer network is connected to terminals or In computer networks, information transfer and exchange
computers in different regions through radio waves or cable is completed through data communications. The transmission
links. Terminals or computers are connected with networks of information needs physical lines, radio waves and some
to receive information passed via the networks. In the electronic equipment for support. Insecurity factors also exist
process of transmission of information, the lines are in such basic equipment. Information in the transmission
inevitably subject to the influence of natural environment process is quite vulnerable to damage, such as network line
and social environment, thus imposing huge adverse impact radiation, wiretapping and so on.
on the network. In nature, there are many factors that affect
D. Computer virus
network security.[1]For example, extreme humidity,
temperature, earthquake, anti-dust conditions, fire, wind and In computer networks, sharing of resources is expected to
some prominent incidents will all cause serious damage to be achieved as much as possible, so there are generally a

978-1-4673-2207-2/12/$31.00 嘋2012 IEEE 328


2012 IEEE Symposium on Robotics and Applications(ISRA)

number of nodes receiving information. Since there is no network security vulnerability for illegal activities, also
way to guarantee the security, each node is very vulnerable known as computer security an attacker. These attackers they
to infection of computer viruses. Once the virus intrudes a employed to modify the webpage, illegal invasion of the host
computer, the consequences would be disastrous. The virus to destroy others procedure, steal online or other information.
will have rapid regeneration and infection in the network, [4]They have to steal him in secret, serve for politics; some
soon spreading to the entire network and making all network to compete with others, to show their superb technology, to
stages infected. If there is no good emergency measure, the win fame; some are simple future destruction and ruin,
virus can paralyze the entire network in very short time. manufacturing network terrorist activities. The above heavy
means although its purpose is not the same, but all of the
E. Network management network information security system constitutes a threat,
To ensure normal operation, dedicated management even some network attacker (hacker) can destroy the
personnel are required to manage network systems. In the network nodes, the release of computer virus, resulting in the
management process, some improper measures would also whole network system.
occur time to time. Any improper operation of the system
management personnel may lead to loopholes in the network H. Internal attack and destroy
management, sometimes causing damage to the equipment, Internal attack and destruction are often some personnel
during which process confidential information is likely to be use their internal system of understanding, premeditated
artificially disclosed. This is not uncommon in reality, and breakthrough network system security attacks, due to internal
most of such errors are caused by human factors. intruders know more about network structure, thus their
Because the staff is working on computer performance as illegal behavior will pose a bigger threat to network system.
well as on the computer's normal regulations not familiar Especially for the enterprise, the enterprise internal network
with such problems, often cause computer to show errors attacks and destroys the sometimes will become the largest
procedure, thereby forming the inadvertent disclosure network threats. Such as those for enterprise disgruntled
information. Secondly, the staff intentionally leaked. In employees, dismissed staff, trusted clients, consultants and
today's society, some of the information staff often to one's other all can enter into the enterprise network system the
private ends and the customer information at disregarding, people are likely to pose a threat to the system. In addition,
on network security destroyed at the same time, also make some people lack awareness of network security, pay no
the computer information system, database important secrets, attention to the protection of their own account, password
or even the computer compromised system file, material may have caused the problem of network security.
outward is provided, on the computer network security According to statistics from related departments, such
problem has caused serious threat. problems in the network security problem in high proportion,
close to 70%.[5]
F. Operating system
The computer system is vulnerable because there are II. COUNTERMEASURES FOR COMPUTER NETWORK
insecurity factors in the computer’s operating system. SECURITY ISSUES
Computer system security has different levels. A computer’s In the last decade, computer technology and network
operating system will not frequently run into security technology embraced rapid development, and was quickly
accidents if its own security level is quite high. For example, applied in various fields, bringing tremendous changes to the
if the security of a computer’s operating system is Level D, it human society, and significantly promoting and shocking
is extremely insecure because it simply does not have economy, culture, science and technology of the whole
security measures, just like a room leaving all doors and society. In modern society, computer technology and
windows open for any visitor to come in and out freely. network technology are applied in all aspects of life, and
Computer systems at this level can only be used as general such application is still constantly deepening. The author
desktop computer’s systems, and cannot be used as server herein proposes the following appropriate strategies and
operating systems due to their higher requirements for technical measures to deal with the abovementioned security
security. In this world, there is no computer system that can issues that can easily arise in computer networks.
run for a long time. Any computer system may stop running
or have operation errors due to hardware failure or software A. Check and promptly repair network security
and other reasons. Some computer systems may cause losses vulnerabilities
because they are taken advantage of by intruders. At present, Network security vulnerability detection should be
security issues of the computer’s operating system mainly lie carried out frequently by the management personnel, because
in port settings, system account management, opening of it can help them to detect all kinds of insecurity factors and a
system services, system security strategy settings, system variety of network security vulnerabilities for timely
security log settings, system access control strategies, etc.[3] detection and timely treatment, so that any vulnerabilities
G. Hacks can be repaired and the results of such repair can be verified
promptly. Vulnerability detection mainly includes three
The hacker to find and attack the network operating aspects—network vulnerability scanning, system security
system's flaws and defects for the purpose, the use of scanning and database system security scanning. The first is

329
2012 IEEE Symposium on Robotics and Applications(ISRA)

network vulnerability scanning, which conducts "black box" database are solved. Not all threats to the database come
evaluation of internal network systems from the boundary from the outside, because some of the threats are from the
points of network security. Scanning and analysis of the inside of the network. Among internal personnel using the
entire network from the perspective of network intruders can network, some may have evil intentions and illegally steal
detect hidden safety issues or defects, which also needs to user names and passwords, which is also possible. Some
use the means of attacks contained in the knowledge data of internal users may take advantage of their relations to use
the software itself. When such analysis detects any defect database beyond their permission, and sometimes, they can
and loophole, corresponding repair recommendations will be even open database files beyond their authority to steal or
proposed. The second is system security scanning. Each interpolate information. In this case, confidentiality is
computer system is equipped with a system security scanner particularly important. By encrypting some important data,
which is configured to the key service host as an agent. The the security of data stored in the database can naturally be
scanner checks common system configuration errors and guaranteed. There are often some important files that can by
security vulnerabilities from the inside of the system, such as no means be known by others in our daily use of the
permission settings for key documents, user settings, path database system, such as trade secrets, financial data or
settings, password settings, network service configuration, virtual property of game players and so on. This kind of files
credibility of applications, etc. The system also has another in the database can all be encrypted to prevent unauthorized
function which is to find signs of hackers’ attacks of the access. After encryption, even if the entire system is
system and thus propose appropriate repair recommendations. destroyed, we do not worry about data destruction, because
The third is database system security scanning. A knowledge encryption can protect data security.
base of software itself exists in the database security scanner,
which also contains all security weaknesses. So such E. Pay attention to backup and use recovery technology
scanning can, by using the existing settings, check the In the network, data information may often be
database services of the target host item by item through the interpolated or maliciously destroyed due to malicious
network or the inside of the system, and then conduct a intrusion. To tackle with this, users should pay attention to
comprehensive assessment of the database after the through application backup and recovery technology. Data backup
inspection.[6] All security vulnerabilities, authentication, and recovery should become a habit, because system failure
authorization, integrity and other issues are used as criteria is inevitable in database system operation and loss of data
for evaluation, such as account permissions, user settings, often occurs. If database backup is well performed in
configuration status, intensity and duration of code password, advance, you do not need to worry even if a sudden system
patches and fixes, etc. failure leads to the destruction of important data, because
there is an intact backup of the data for restoration. Data
B. Make rational use of firewall backup is a wise act of precautions. After unpredictable
All applications of the computer network usually would failures, administrators can use the data backup to restore the
set a firewall to protect the internal network from attacks. database to the state before the failures. In this way, the
The so-called firewall refers to the establishment of a integrity and consistency of the data can be guaranteed.
security control point in internal or external network or
between any two networks. Any flow of data passing F. Strengthening computer users and management
through the firewall needs to go through testing to decide security awareness training
whether to allow, reject or redirect, so that all incoming and Personal computer users to strengthen network security
outgoing network services and visits will be audited and awareness training, according to their responsibilities and
controlled, information security can be guaranteed, and the authorities, choose a different password, data to the
internal network can be protected from malicious attacks as application for legal operation, preventing other users from
much as possible. unauthorized access of data and the use of cyber source. At
the same time, when in use must pay attention to the virus
C. Implement intrusion detection to prevent hacker attacks fortification, attach importance to antivirus software updates,
Intrusion detection is implemented to detect malicious the network front end for antivirus. Strengthen the
and suspicious activities in network, and intercept and management of the network safety consciousness,
prevent them in a timely manner once discovered to ensure occupation morals, the cultivation of the sense of
the normal operation of the network. The damage caused by responsibility, build, perfect safety management system,
network intrusion sometimes is unimaginable. Therefore, continuously strengthen the computer network information
once network intrusion is detected, effective measures must security standardization management, strengthen the
be taken immediately to stop it to minimize its consequences. construction of computer network security, security, to
For example, you can modify the configuration of firewall, provide a reliable guarantee.
host, routers and application systems to block the attack and Network security is maintained on one hand we should
on this basis, track and locate the source of attack. rely on advanced software defense, on the other hand, want
to rely on the professional network assessment and
D. Properly use encryption technology
monitoring of personnel. This elite team in the hacker on the
Many network security issues are derived from the opposite side, mainly on the network operation process of
database, and may be solved as long as the issues of the monitoring, observational study whether illegal attack exists,

330
2012 IEEE Symposium on Robotics and Applications(ISRA)

and then evaluated, and puts forward some suggestions for


improvement, in order to improve the network running
mechanism.
REFERENCES
III. CONCLUSION
[1] Wang Hui. Technical Discussion on Sustainable Development of
Computer network security involves square respect area, Digital Society [J]. Journal of Hebei Radio and Television University,
is a complex system. It is needed for the upkeep of the multi 2005 (4) 65.
agent participation, but also to engage the front prevention, [2] Zhu He. Study on University Computer Network Security Issues [J].
monitoring, and afterwards make up for 3 understaffed, Network Security Technology and Application Magazine, 2008 (2)
69.
continue to strengthen safety consciousness, improve safety
technology, establishing security policy, thus enhancing the [3] Li Ji. Computer Network Security Analysis [J]. Information and
Computer (Theory Edition), 2010 (7) 32.
security of computer network.Computer technology and
[4] Chen Lianbo. Analysis of computer network security technology [J ].
network technology are widely used in real life, bringing Fujian computer, 2009 ( 3): 56-57.
convenience to people. But it also has its own shortcomings, [5] Ni Chaofan. Discussion of computer network security technology [ J].
of which the most criticized is security issues, requiring key Journal of Chifeng University, 2009 ( 12): 45-46.
breakthroughs in the efforts to ensure computer network [6] Zhang Yingying. Discussion on computer network security
security. In this article, the author analyzes the reasons for technology [J]. Science and technology information, 2009 ( 31): 48
security issues and technical countermeasures. It is believed [7] Zhao Qin. The computer network information security technology
that with growing maturity, computer network technology research [ J]. China new technology and new products, 2009 ( 14):
will bring more and more convenience to people's life and 36-38.
work.

331

Vous aimerez peut-être aussi