求一篇关于介绍网络安全的英文文章,越长越好,详细些!谢谢

如题所述

Internet security problems

Your email does not fly directly from your computer to the
intended recipient’s computer. It goes through several nodes and leaves
behind information as it passes. It can be accessed all along the path (not only in/from your country!)

Someone could be looking over your shoulder as you type. This is
especially problematic in internet cafes. If you are connected to a
network, your email may be accessible to everyone else in the office.
Your system administrator may have special administrative privileges to
access all emails.

Your internet service provider (ISP) has access to your emails, and
anyone with influence over your ISP may be able to pressure it into
forwarding them copies of all your emails or to stop certain emails from
getting through.

As they pass through the internet, your emails flow through hundreds
of insecure third-parties. Hackers can access email messages as they
pass. The ISP of your intended recipient may also be vulnerable, along
with the network and office of your intended recipient.

Basic internet security

Viruses and other problems, such as Trojan Horses or Trojans, can
come from anywhere; even friends may unknowingly spread viruses. Use a
good anti-virus program and keep up-to-date with automatic online
updating. New viruses are constantly being created and discovered, so
check out the Virus Information Library at www.vil.nai.com for the latest virus protection patches.

Viruses are usually spread through emails, so practice safe emailing
(see below). Viruses are single programs designed to replicate and may
or may not be malignant. Trojans are programs designed to give a third
party (or anyone!) access to your computer.

A good firewall can help you appear invisible to hackers and keep out
intruders trying to get into your system. This ensures that only
authorised applications can connect to the internet from your computer
and prevents programs such as Trojans from sending out information or
opening “back doors” to your computer through which hackers can enter.

A “key logger” system can track every keystroke you make. These
programs are spread either by someone putting it onto your computer
while you are away, or through a virus or Trojan that attacks your
system over the internet. Key loggers track your keystrokes and report
on your activities, usually over the internet. They can be defeated
through passphrase-protecting your computer, practising safe emailing,
using an anti-virus program, and using a mouse-guided program to type in
your passphrase. Key loggers can also be disabled by physically
disconnecting your computer’s internet access -usually by simply
unplugging the computer’s telephone connection - when you are not using
the computer.

An email address can be “spoofed” (faked) or used by someone other
than the true owner. This can be done by obtaining access to another
person’s computer and password, by hacking into the service provider, or
by using an address that appears to be the specific person’s address.
For example, by exchanging the lowercase “l” with the number “1”, you
can create a similar address and most people will not notice the
difference. To avoid being fooled by a spoof, use meaningful subject
lines and periodically ask questions that only the true person could
answer. Confirm any suspicious requests for information by following it
up through another form of communication.

Keep your browsing activity private by not accepting cookies and by
deleting your cache after every time you use the web. In Internet
Explorer, go to Tools, then Options. In Netscape Navigator, go to Edit,
then Preferences. While you’re in either of these menus, delete all your
history, any cookies you may have and empty your cache. Remember to
delete all your bookmarks as well. Browsers also keep records of the
site you visit in cache files, so find out which files should be deleted
on your system.

Upgrade all web browsers to support 128-bit encryption. This will
help safeguard any information you want to pass securely over the web,
including passwords and other sensitive data submitted on forms. Install
the most recent security patches for all software used, especially
Microsoft Office, Microsoft Internet Explorer and Netscape.

Don’t use a computer with delicate information stored on it for non-essential web browsing.
温馨提示:答案为网友推荐,仅供参考
第1个回答  2016-11-14
next and the joy of the game of livin

相关了解……

你可能感兴趣的内容

本站内容来自于网友发表,不代表本站立场,仅表示其个人看法,不对其真实性、正确性、有效性作任何的担保
相关事宜请发邮件给我们
© 非常风气网