求一篇关于介绍网络安全的英文文章,越长越好,详细些!谢谢 100
展开全部
Internet security problems
Your email does not fly directly from your computer to the
intended recipient’s computer. It goes through several nodes and leaves
behind information as it passes. It can be accessed all along the path (not only in/from your country!)
Someone could be looking over your shoulder as you type. This is
especially problematic in internet cafes. If you are connected to a
network, your email may be accessible to everyone else in the office.
Your system administrator may have special administrative privileges to
access all emails.
Your internet service provider (ISP) has access to your emails, and
anyone with influence over your ISP may be able to pressure it into
forwarding them copies of all your emails or to stop certain emails from
getting through.
As they pass through the internet, your emails flow through hundreds
of insecure third-parties. Hackers can access email messages as they
pass. The ISP of your intended recipient may also be vulnerable, along
with the network and office of your intended recipient.
Basic internet security
Viruses and other problems, such as Trojan Horses or Trojans, can
come from anywhere; even friends may unknowingly spread viruses. Use a
good anti-virus program and keep up-to-date with automatic online
updating. New viruses are constantly being created and discovered, so
check out the Virus Information Library at www.vil.nai.com for the latest virus protection patches.
Viruses are usually spread through emails, so practice safe emailing
(see below). Viruses are single programs designed to replicate and may
or may not be malignant. Trojans are programs designed to give a third
party (or anyone!) access to your computer.
A good firewall can help you appear invisible to hackers and keep out
intruders trying to get into your system. This ensures that only
authorised applications can connect to the internet from your computer
and prevents programs such as Trojans from sending out information or
opening “back doors” to your computer through which hackers can enter.
A “key logger” system can track every keystroke you make. These
programs are spread either by someone putting it onto your computer
while you are away, or through a virus or Trojan that attacks your
system over the internet. Key loggers track your keystrokes and report
on your activities, usually over the internet. They can be defeated
through passphrase-protecting your computer, practising safe emailing,
using an anti-virus program, and using a mouse-guided program to type in
your passphrase. Key loggers can also be disabled by physically
disconnecting your computer’s internet access -usually by simply
unplugging the computer’s telephone connection - when you are not using
the computer.
An email address can be “spoofed” (faked) or used by someone other
than the true owner. This can be done by obtaining access to another
person’s computer and password, by hacking into the service provider, or
by using an address that appears to be the specific person’s address.
For example, by exchanging the lowercase “l” with the number “1”, you
can create a similar address and most people will not notice the
difference. To avoid being fooled by a spoof, use meaningful subject
lines and periodically ask questions that only the true person could
answer. Confirm any suspicious requests for information by following it
up through another form of communication.
Keep your browsing activity private by not accepting cookies and by
deleting your cache after every time you use the web. In Internet
Explorer, go to Tools, then Options. In Netscape Navigator, go to Edit,
then Preferences. While you’re in either of these menus, delete all your
history, any cookies you may have and empty your cache. Remember to
delete all your bookmarks as well. Browsers also keep records of the
site you visit in cache files, so find out which files should be deleted
on your system.
Upgrade all web browsers to support 128-bit encryption. This will
help safeguard any information you want to pass securely over the web,
including passwords and other sensitive data submitted on forms. Install
the most recent security patches for all software used, especially
Microsoft Office, Microsoft Internet Explorer and Netscape.
Don’t use a computer with delicate information stored on it for non-essential web browsing.
Your email does not fly directly from your computer to the
intended recipient’s computer. It goes through several nodes and leaves
behind information as it passes. It can be accessed all along the path (not only in/from your country!)
Someone could be looking over your shoulder as you type. This is
especially problematic in internet cafes. If you are connected to a
network, your email may be accessible to everyone else in the office.
Your system administrator may have special administrative privileges to
access all emails.
Your internet service provider (ISP) has access to your emails, and
anyone with influence over your ISP may be able to pressure it into
forwarding them copies of all your emails or to stop certain emails from
getting through.
As they pass through the internet, your emails flow through hundreds
of insecure third-parties. Hackers can access email messages as they
pass. The ISP of your intended recipient may also be vulnerable, along
with the network and office of your intended recipient.
Basic internet security
Viruses and other problems, such as Trojan Horses or Trojans, can
come from anywhere; even friends may unknowingly spread viruses. Use a
good anti-virus program and keep up-to-date with automatic online
updating. New viruses are constantly being created and discovered, so
check out the Virus Information Library at www.vil.nai.com for the latest virus protection patches.
Viruses are usually spread through emails, so practice safe emailing
(see below). Viruses are single programs designed to replicate and may
or may not be malignant. Trojans are programs designed to give a third
party (or anyone!) access to your computer.
A good firewall can help you appear invisible to hackers and keep out
intruders trying to get into your system. This ensures that only
authorised applications can connect to the internet from your computer
and prevents programs such as Trojans from sending out information or
opening “back doors” to your computer through which hackers can enter.
A “key logger” system can track every keystroke you make. These
programs are spread either by someone putting it onto your computer
while you are away, or through a virus or Trojan that attacks your
system over the internet. Key loggers track your keystrokes and report
on your activities, usually over the internet. They can be defeated
through passphrase-protecting your computer, practising safe emailing,
using an anti-virus program, and using a mouse-guided program to type in
your passphrase. Key loggers can also be disabled by physically
disconnecting your computer’s internet access -usually by simply
unplugging the computer’s telephone connection - when you are not using
the computer.
An email address can be “spoofed” (faked) or used by someone other
than the true owner. This can be done by obtaining access to another
person’s computer and password, by hacking into the service provider, or
by using an address that appears to be the specific person’s address.
For example, by exchanging the lowercase “l” with the number “1”, you
can create a similar address and most people will not notice the
difference. To avoid being fooled by a spoof, use meaningful subject
lines and periodically ask questions that only the true person could
answer. Confirm any suspicious requests for information by following it
up through another form of communication.
Keep your browsing activity private by not accepting cookies and by
deleting your cache after every time you use the web. In Internet
Explorer, go to Tools, then Options. In Netscape Navigator, go to Edit,
then Preferences. While you’re in either of these menus, delete all your
history, any cookies you may have and empty your cache. Remember to
delete all your bookmarks as well. Browsers also keep records of the
site you visit in cache files, so find out which files should be deleted
on your system.
Upgrade all web browsers to support 128-bit encryption. This will
help safeguard any information you want to pass securely over the web,
including passwords and other sensitive data submitted on forms. Install
the most recent security patches for all software used, especially
Microsoft Office, Microsoft Internet Explorer and Netscape.
Don’t use a computer with delicate information stored on it for non-essential web browsing.
2016-11-14
展开全部
next and the joy of the game of livin
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询