What Is the Importance of Computer Security?
Computer security mainly includes three parts: operating system security, database security and network security. Among them, network security is a current issue of great concern. [1]
Computer security technology
- Title: Computer Security Technology
- Author:
- This book is written based on the principle of "theoretical knowledge is sufficient and the emphasis is on practical application". The book provides a large number of examples of operating systems, databases, and network security. Concepts are derived from the examples to help readers grasp Basic principles of computer security and competent computer and network security management. It is written by the author on the basis of summing up many years of teaching experience. It is suitable for use as a course textbook for computer majors, applied undergraduate computer majors and similar majors in higher vocational colleges.
- Chapter 1 Introduction to Computer Security
- 1-1 The Importance of Computer Security Research
- 1-1-1 threats to computer systems
- 1-1-2 Vulnerability of computer systems
- 1-1-3 The Importance of Computer System Security
- 1-2 Computer System Security Technology
- 1-2-1 Development Process of Computer Security Technology
- 1-2-2 Research contents of computer security technology
- 1-2-3 Design Principles of Computer Security System
- 1-3 Computer System Security Assessment
- 1-3-1 Importance of Computer System Security Assessment
- 1-3-2 Computer System Security Standards
- 1-3-3 computer system security level
- 1-4 Computer Security Regulations
- 1-4-1 Necessity of Computer Security Legislation
- 1-4-2 Introduction to Computer Security Regulations
- 1-5 Development Direction and Market Analysis of Computer Security Technology
- 1-6 Chapter Summary
- exercise
- Chapter 2 Physical and Hardware Security Technologies
- 2-1 Computer room security environmental conditions
- 2-1-1 computer room site environment selection
- 2-1-2 Environmental Conditions in Computer Room
- 2-2 physical and hardware security protection
- 2-2-1 Three prevention measures (fire, water, and theft)
- 2-2-2 Electromagnetic protection
- 2-2-3 Access Control of Storage Media
- 2-3 Computer hardware inspection and maintenance
- 2-3-1 Analysis of Computer Hardware Failure
- 2-3-2 Hardware failure detection steps and principles
- 2-3-3 hardware fault diagnosis and troubleshooting
- 2-4 Chapter Summary
- exercise
- Chapter 3 Computer Software Security Technology
- 3-1 Software Security Technology Overview
- 3-2 Software Analysis Technology
- 3-2-1 Static Analysis Technology
- 3-2-2 Dynamic Analysis Technology
- 3-3 commonly used software protection technology
- 3-3-1 serial number method
- 3-3-2 time limit
- 3-3-3NAG window
- 3-3-4KeyFile protection
- 3-3-5 Procedures for Function Restrictions
- 3-3-6CD-check
- 3-4 anti-tracking technology
- 3-4-1 Suppressing Tracking Interrupts
- 3-4-2 Block keyboard input
- 3-4-3 Set the display performance of the monitor
- 3-4-4 detection and tracking method
- 3-4-5 Destroy the interrupt vector table
- 3-4-6 Set the stack pointer method
- 3-4-7 Encrypted program execution
- 3-4-8 Check the block
- 3-4-9 confuse and drag down the decrypter
- 3-4-10 instruction stream queue method
- 3-4-11 reverse instruction flow method
- 3-4-12 mixed programming method
- 3-4-13 self-programmed soft interrupt 13 technology
- 3-5 software shelling and shelling
- 3-5-1 Packing
- 3-5-2 Shelling
- 3-6 Software Security Protection Recommendations
- 3-7 Summary
- exercise
- Chapter 4 Operating System Security Basics
- Chapter 5 Cryptography
- Chapter 6 Database System Security
- Chapter 7 Computer Viruses and Prevention
- Chapter 8 Cyber Security Technologies
- Chapter 9 Firewall Technology
- Chapter 10 Hacker Attacks and Prevention
- Appendix I Regulations of the People's Republic of China on Computer Information System Security Protection
- Appendix II Management Measures for International Network Security Protection of Computer Information Networks
- Graduated from the Chinese Department of Peking University in 1981, and later entered
- Computer Security Technology ": 21st Century Vocational College Planning Textbooks · Computer Application Series