What Are the Different Types of Computer Security Techniques?

Computer security mainly includes three parts: operating system security, database security and network security. Among them, network security is a current issue of great concern. [1]

Computer security technology

Title: Computer Security Technology
Author:
This book is written based on the principle of "theoretical knowledge is sufficient and the emphasis is on practical application". The book provides a large number of examples of operating systems, databases, and network security. Concepts are derived from the examples to help readers grasp Basic principles of computer security and competent computer and network security management. It is written by the author on the basis of summing up many years of teaching experience. It is suitable for use as a course textbook for computer majors, applied undergraduate computer majors and similar majors in higher vocational colleges.
Chapter 1 Introduction to Computer Security
1-1 The Importance of Computer Security Research
1-1-1 threats to computer systems
1-1-2 Vulnerability of computer systems
1-1-3 The Importance of Computer System Security
1-2 Computer System Security Technology
1-2-1 Development Process of Computer Security Technology
1-2-2 Research contents of computer security technology
1-2-3 Design Principles of Computer Security System
1-3 Computer System Security Assessment
1-3-1 Importance of Computer System Security Assessment
1-3-2 Computer System Security Standards
1-3-3 computer system security level
1-4 Computer Security Regulations
1-4-1 Necessity of Computer Security Legislation
1-4-2 Introduction to Computer Security Regulations
1-5 Development Direction and Market Analysis of Computer Security Technology
1-6 Chapter Summary
exercise
Chapter 2 Physical and Hardware Security Technologies
2-1 Computer room security environmental conditions
2-1-1 computer room site environment selection
2-1-2 Environmental Conditions in Computer Room
2-2 physical and hardware security protection
2-2-1 Three prevention measures (fire, water, and theft)
2-2-2 Electromagnetic protection
2-2-3 Access Control of Storage Media
2-3 Computer hardware inspection and maintenance
2-3-1 Analysis of Computer Hardware Failure
2-3-2 Hardware failure detection steps and principles
2-3-3 hardware fault diagnosis and troubleshooting
2-4 Chapter Summary
exercise
Chapter 3 Computer Software Security Technology
3-1 Software Security Technology Overview
3-2 Software Analysis Technology
3-2-1 Static Analysis Technology
3-2-2 Dynamic Analysis Technology
3-3 commonly used software protection technology
3-3-1 serial number method
3-3-2 time limit
3-3-3NAG window
3-3-4KeyFile protection
3-3-5 Procedures for Function Restrictions
3-3-6CD-check
3-4 anti-tracking technology
3-4-1 Suppressing Tracking Interrupts
3-4-2 Block keyboard input
3-4-3 Set the display performance of the monitor
3-4-4 detection and tracking method
3-4-5 Destroy the interrupt vector table
3-4-6 Set the stack pointer method
3-4-7 Encrypted program execution
3-4-8 Check the block
3-4-9 confuse and drag down the decrypter
3-4-10 instruction stream queue method
3-4-11 reverse instruction flow method
3-4-12 mixed programming method
3-4-13 self-programmed soft interrupt 13 technology
3-5 software shelling and shelling
3-5-1 Packing
3-5-2 Shelling
3-6 Software Security Protection Recommendations
3-7 Summary
exercise
Chapter 4 Operating System Security Basics
Chapter 5 Cryptography
Chapter 6 Database System Security
Chapter 7 Computer Viruses and Prevention
Chapter 8 Cyber Security Technologies
Chapter 9 Firewall Technology
Chapter 10 Hacker Attacks and Prevention
Appendix I Regulations of the People's Republic of China on Computer Information System Security Protection
Appendix II Management Measures for International Network Security Protection of Computer Information Networks
Graduated from the Chinese Department of Peking University in 1981, and later entered
Computer Security Technology ": 21st Century Vocational College Planning Textbooks · Computer Application Series

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?