第八章 信息安全概论

103
第第第 第第第第第第

Upload: saki

Post on 04-Jan-2016

122 views

Category:

Documents


0 download

DESCRIPTION

第八章 信息安全概论. 问题的提出: 你的计算机有中过毒吗?被人攻击过吗? 我们现在的计算机系统安全吗? 互联网可靠吗? 谈谈你对电子商务、电子银行的看法。. 学习 目标: 了解计算机信息安全的定义、了解国家有关计算机信息安全的法律、法规,增强计算机安全的法律意识、了解计算机病毒、木马等程序的结构和基本机理、知道保证计算机信息安全的主要技术手段、了解密码学和数据加密的基本原理及其在计算机信息安全方面的重要作用和会设置计算机密码和使用杀毒软件等工具保护自己的计算机. 第八章 信息安全概论. 学习目的和要求: 1. 了解计算机信息安全的定义 - PowerPoint PPT Presentation

TRANSCRIPT

  • 1.2.3.4.5.6.

  • 8.1

  • 1 PC

  • 2 123

  • 3 4 PC

  • 2001200120 2003125SQL2003811Windows90%5

  • ScriptJAVAShockwave

  • 2001719 01:05:00 2001719 20:15:00

  • BOJAVA

  • 1CIH CIHflash BIOS 32Wwdows95/98DOSWINDOWS3.XNTCIHCIH.2626CIH.42627282NATAS .EXE.COM

  • Worms.Nimda 2001918W32.Nimda.A@mm Worms.NimdaemailIISW32.Nimda.A@mm email,NT/2000IISJavaScript57344.htm, .html. .aspIEOutlook Expressreadme.eml windows9x

  • W32/Bady.worm 2001718Microsoft Index Server 2.0Windows 2000IISIndexing Service()Index Server ISAPI ExtensionWEB TCP/IP80TCP/IPWEBc:\notworm

  • Worm.Blaster 2003812RPC DCOMRPCWindowsmsblast.exemsblast.exe69,TFTP,RPC135RPC

  • (Worm.Sasser) 200451(Worm.Sasser)LSASSavserve.exeavserve.exeTCP5554FTP445LSASS

  • 123

  • 45

  • 8.2 hack2020 70

  • Carck@ShadowShadowShadow

  • 6E-mailE-mailNetbull(Netthief)WAY2.4Netspyhttp://nj.onlinedown./iparmor.htmPChttp://www.cnlvker.com

  • IP

  • bug, FPTguest

  • 200

  • Internet

  • 20021200222020032 MasterCardVISA

  • ICSA/FBI, 2001

  • 201/38020

  • FBI75

  • TCP/IP

  • Denial of Service

  • Eavesdropping

  • Intrusion

  • Loss of Integrity

  • E-Mail (E-Mail Bombing) (Logic Bombing)DDos (Distributed Denial of Service ) (Trojan Horse Program) (Password Intrusion) (Eavesdropping)IP (IP Spoofing) (Viruses)

  • E-Mail E-MailE-Mail

  • DDos DDos (Distributed Denial of Service)Web DDosWinNukeBonkTearDropWinArpFluShotBlooPIMPJolt

  • BO2000Net SpyGlaicer

  • (Net X-Ray for Windows9598NTSniffit for LinuxSolaries)

  • IP IPIP

  • 8.3NTFSFATNTFS(RAS)RASTCP/IP 44

  • VPNHA

  • IT

  • VPN

  • Detection Protect Reaction Recovery Management PDRR(MDPRR)

  • 8.4 ,,

  • Computer securityISO 21

  • VPN

  • 8.5 ,,

  • KEM,EC, C=E(M,K) KEK

  • (Encryption)(Plaintext)(Ciphertext)(Decryption) (Plaintext) (Ciphertext) (Key) (Encryption)(Decryption)

  • Hash

  • YSmmYSYYn,d s=md mod nS SYn,es se mod n=(md)e mod n=mSsYn,dYn,e,

  • RSApq()n=pq()(n)=(p-1)(q-1)()eged(e, (n))=1()dde1(mod (n))()RSA c=E(m) mc (mod n) D(c) cd mod n

  • 1 p=11,q=132) n=pq=143(n)=(p-1)(q-1)=1203) e=7 ,ged(e, (n))=14) dde1(mod (n))d=103 () 1437143103 ss=85,SYn,e=(143,7),S c=se mod n=857 mod 143=123cYYc=123 n,d=(143,103) 123103 mod 143=85

  • Hash hash algorithmmessage-digest algorithm digestMD5SHA-1

  • AliceAlice-2-1AliceBobAliceBobBobAlice

  • digital signature

  • CA: Certificate Authorities

  • DES(Data Encryption Standard)3DESRC4AESRSA

  • IC

  • 12P208 1-834

    199863619933181999812201/3

    201/38020

    FBI75

    TCP/IP

    TCP/IPInternetSATAN

    E-Mail (E-Mail Bombing) (Logic Bombing) DDos (Distributed Denial of Service ) (Trojan Horse Program) (Password Intrusion) (Eavesdropping) IP (IP Spoofing) (Viruses)

    E-Mail E-MailE-MailCGI

    (1)IP(2)

    DDos DDos (Distributed Denial of Service)Web DDos:WinNukeOOBBonkUDPTearDropIPTCP/IPWinArpLandIPSYNTCPFluShotIPBlooICMPPIMPIGMPJoltICMPUDP windowsIP

    FingerFingerX.500X.500 (1)TelnetFTPHTTPSMTPSUID (NetXRay for Windows9598NTSniffit for LinuxSolaries) IP IP TCPIPTCPIP

    IT

    VPN

    VPN