Click here to load reader

網路安全防護

Embed Size (px)

DESCRIPTION

 

Citation preview

  • 1. 2012/4/111 by

2. ISO 27001/ BS7799 2 by 3. 1970) (cryptography) (cryptology) (cryptanalysis) 3 by 4. 1980) ()() (information applianceIA) (information safeguarding) (security policy & management)4 by 5. 5 by 6. (plaintext) (chiphertext) : Symmetric Key Asymmetric Key6 by 7. Secret Key (B)B 7 by 8. Public Key RSA RSA 8 by 9. 9 by 10. 10 by 11. -2 A AB BAA 11 by 12. X.509: 12 by 13. 13 by 14. 14 by 15. : (In-line) (On-line) (Off-line15 by 16. 16 by 17. 17 by 18. 18 by 19. (Boot Strap Sector Virus) (File Infector Virus) (Multi-Partite Virus) (Macro Virus) (Polymorphic/Mutation Virus) (Warm)19 by 20. JavaScriptVBScript ActiveX JAVA 20 by 21. (firewall) 21 by 22. 22 by 23. 23 by 24. 24 by 25. 25 by 26. Proxy Server 26 by 27. 27 by 28. 28 by 29. Single Bastion Host 29 by 30. 30 by 31. (Intrusion Detection System IDS) 31 by 32. IDS 32 by 33. : (signature-based detection) (anomaly detection) (mixed and hybrid mode detection )33 by 34. 34 by 35. IDS IDS 35 by 36. 36 by 37. : 37 by 38. 38 by 39. 39 by 40. 40 by 41. (smart card) 41 by 42. () ()42 by 43. 43 by 44. 44 by 45. 45 by 46. FHFIJRNFXNSNHFACADEMIA SINICAAFCH46 by