首页 | 本学科首页   官方微博 | 高级检索  
     检索      

信息安全关键技术演示系统的设计与实现
引用本文:李月寒,郑议天.信息安全关键技术演示系统的设计与实现[J].安徽教育学院学报,2008,26(6).
作者姓名:李月寒  郑议天
作者单位:徽商职业学院电子信息系,安徽,合肥,230022
摘    要:研究了缓冲区溢出攻击、木马和远程控制技术、蠕虫病毒原理、PGP、SSL和IPsec安全协议6类信息安全技术的原理,并实现了基于B/S结构的信息安全技术演示系统,充分利用生动的多媒体教学形式,由浅入深、在理论分析的基础上完成了基于缓冲区溢出攻击的演示系统的设计和实现.

关 键 词:信息安全技术  缓冲区溢出  安全协议  演示系统

Design and Implementation of Information Security Technology Demonstration System
Li Yue-han,ZHENG Yi-tian.Design and Implementation of Information Security Technology Demonstration System[J].Journal of Anhui Institute of Education,2008,26(6).
Authors:Li Yue-han  ZHENG Yi-tian
Institution:Li Yue-han,ZHENG Yi-tian(Department of Electronic Information,Huishang Vocational Technical College,Hefei 230038,China)
Abstract:This paper discusses the working principles of Buffer Overflow Attacks,Trojan Horse & Remote Control,Worm Virus,PGP protocol,SSL protocol and IPSec protocol etc.,the implementation of a Browser/Server based on information security technology demonstration system,which makes full use of multimedia and programs to show information security technology in different ways.On the basis of the theoretical analysis,the information security technology demonstration system is designed and implemented in five different...
Keywords:information security technology  buffer overflow attacks  security protocol  demonstration system  
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号