ALL > Computer and Education > courses > university courses > undergraduate courses > An Overview of Computer Science > zstu-(2020-2021-2) > online discussion >
onlinediscussion-4 Version 0
👤 Author: by writer 2021-03-23 01:02:50
Why security for networking is important? and discuss several attacks of networks

Please login to reply. Login

wx287_oz26ftyeszxunhjb6ehly8qq5vdi • 2021-03-23 09:35:00
hackers gather personal information illegally through Internet
a seventeen teenager hacked twitter last year PostVer 0

Please login to reply. Login

3108655967qqcom • 2021-03-23 09:40:13
Facebook user data was taken and used to analyse their preferences by a company that helped Donald Trump win the US presidency. PostVer 0

Please login to reply. Login

1917871807qqcom • 2021-03-23 13:24:16
<p style="padding-left: 30px;">Because we need security, in order to ensure that the software, hardware and data resources in the network system are not damaged, tampered with and leaked for any reason.Regarding network attack, SYN Flood is a typical denial-of-service attack.DNS spoofing is tricking a computer with a bogus DNS reply.
<!--more--></p> PostVer 0

Please login to reply. Login

zboa6023gmailcom • 2021-03-24 08:26:36
Furthermore, network security is so important simply because we live in a digital-first world.
<p class="p1"><span class="s1">There are two main types of </span><span class="s2">network attacks</span><span class="s1">: Passive: this is when sensitive information is screened and monitored, potentially compromising the </span><span class="s2">security</span><span class="s1"> of enterprises and their customers. Active: this is when information is altered by a hacker or destroyed entirely.</span></p>
&nbsp;

&nbsp; PostVer 0

Please login to reply. Login

nintendolinkfoxmailcom • 2021-03-24 10:20:18
Because without security for networking, everyone’s information will be exposed on the Internet. For example, the Playstation Network of Sony, was hacked on 2011, which causes millions of people’s personal information including credit card number and email leak. PostVer 0

Please login to reply. Login

3058218005qqcom • 2021-03-24 13:28:27
A good <b>network security</b> system helps business reduce the risk of falling victim of data theft and sabotage. <b>Network security</b> helps protect your workstations from harmful spyware.
<ol>
<li><a class="post-link" href="https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/#Denial-of-service%20(DoS)%20and%20distributed%20denial-of-service%20(DDoS)%20attacks">Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks</a></li>
<li><a class="post-link" href="https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/#Man-in-the-middle%20(MitM)%20attack">Man-in-the-middle (MitM) attack</a></li>
<li><a class="post-link" href="https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/#Phishing%20and%20spear%20phishing%20attacks">Phishing and spear phishing attacks</a></li>
<li><a class="post-link" href="https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/#Drive-by%20attack">Drive-by attack</a></li>
<li><a class="post-link" href="https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/#Password%20attack">Password attack</a></li>
<li><a class="post-link" href="https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/#SQL%20injection%20attack">SQL injection attack</a></li>
<li><a class="post-link" href="https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/#Cross-site%20scr ipting%20(XSS)%20attack">Cross-site scr ipting (XSS) attack</a></li>
<li><a class="post-link" href="https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/#Eavesdropping%20attack">Eavesdropping attack</a></li>
<li><a class="post-link" href="https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/#Birthday%20attack">Birthday attack</a></li>
<li><a class="post-link" href="https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/#Malware%20attack">Malware attack</a></li>
</ol> PostVer 0

Please login to reply. Login

3218825920qqcom • 2021-03-24 14:09:49
Network security is not only related to the economic development and security of the whole country, but also affects the economic and social stability, which may leak personal privacy and personal information, causing social unrest.Network attacks include password intrusion, Trojan horse, WWW spoofing, node attack and so on PostVer 0

Please login to reply. Login

1281489327qqcom • 2021-03-24 17:42:19
PostVer 0

Please login to reply. Login

542236691qqcom • 2021-03-25 15:47:38
Technical and administrative security protection established and adopted for data processing systems to protect computer hardware,software,and data from accidental and malicious damage,change,and disclosure.

Such as information leakage,information theft:data tampering,data deletion,computer viruses,etc. PostVer 0

Please login to reply. Login

3301794392qqcom • 2021-03-27 21:53:39
Internet is an open network without control mechanism. Hackers often invade the computer system in the network, or steal confidential data and privileges, or destroy important data, or make the system function not fully play until paralysis. The spread of computer virus through the Internet brings great harm to Internet users. The virus can paralyze the computer and computer network system, and lose data and files. The spread of virus on the network can be transmitted through public anonymous FTP file, or through mail and additional files of mail PostVer 0

Please login to reply. Login

3301794392qqcom • 2021-03-27 21:54:35
Internet is an open network without control mechanism. Hackers often invade the computer system in the network, or steal confidential data and privileges, or destroy important data, or make the system function not fully play until paralysis. The spread of computer virus through the Internet brings great harm to Internet users. The virus can paralyze the computer and computer network system, and lose data and files. The spread of virus on the network can be transmitted through public anonymous FTP file, or through mail and additional files of mail.There are mainly four ways to interrupt, intercept, modify and forge
Interruption is aimed at availability, which destroys system resources and makes network unavailable.
Interception takes confidentiality as the attack target, and unauthorized users gain access to system resources by some means.
Modification aims at integrity. Unauthorized users not only access but also modify data.
Forgery aims at integrity, and unauthorized users insert the forgery data into the normal transmission data PostVer 0

Please login to reply. Login

1017364560qqcom • 2021-03-27 22:00:19
Entering the 21st century, with the rapid development of information construction and IT technology, the application of various network technology is more extensive, many network security problems at the same time, the more evident the importance of network security technology, network security has become the focus of international attention, not only relates to the organization and individual users of information resources and assets risk, also relates to national security and social stability.
PostVer 0

Please login to reply. Login

1017364560qqcom • 2021-03-27 22:02:19
Example: XP system out of service;14 million details leaked from Chinese express delivery service PostVer 0

Please login to reply. Login

1498139310qqcom • 2021-03-28 00:08:31
First, network security involves national security. Secondly, network security affects economic and social stability. Finally, network security is closely related to the right of the people. Attacks of networks :Password intrusion、Node attack and so on. PostVer 0

Please login to reply. Login

981193371qqcom • 2021-03-28 09:01:22
<a href="http://www.yvsou.com/wp-content/uploads/sites/30/2021/03/VIW@W_C8VU1FDOCQO2.png"><img class="alignnone size-medium wp-image-9408" src="http://www.yvsou.com/wp-content/uploads/sites/30/2021/03/VIW@W_C8VU1FDOCQO2-300x207.png" alt="" width="300" height="207" /></a> PostVer 0

Please login to reply. Login

1281489327qqcom • 2021-03-28 09:45:10
Entering the 21st century, with the rapid development of information construction and IT technology, the application of various network technology is more extensive, many network security problems at the same time, the more evident the importance of network security technology, network security has become the focus of international attention, not only relates to the organization and individual users of information resources and assets risk, also relates to national security and social stability, has become a new field of research and talent demand. Only by taking practical and effective measures in the aspects of law, management, technology and morality, can we ensure the stable development of network construction and application "well and fast".
Phishing site PostVer 0

Please login to reply. Login

wx287_oz26ftxkg9s80omiw6ifl9sdtr-s • 2021-03-28 16:16:30
With the rapid development of computer technology, information network has become an important guarantee of social development. There are a lot of sensitive information, even state secrets. So it will inevitably attract all kinds of man-made attacks from all over the world (such as information leakage, information theft, data tampering, data deletion, computer virus, etc.).

Forms: virus , worm , trojan horse , spyware , etc.

A virus is software that infects a computer by inserting itself into programs that already reside in the machine. Then, when the "host" program is executed, the virus is also executed. when executed, many viruses do little more than try to transfer themselves to other programs within the computer. Some viruses, however, perform devastating actions such as degrading portions of the operating system, erasing large blocks of mass storage, or otherwise corrupting data and other programs. PostVer 0

Please login to reply. Login

2287245796qqcom • 2021-03-28 19:19:01
Nowadays, network is an  essential part of our daily lives, and cash are becoming less and less used, which means all financial transaction occurs via network. So if the network is compromised, the economy will face fatal problems. PostVer 0

Please login to reply. Login

1634605411qqcom • 2021-03-29 17:33:24
In order to protect personal information security

1. Wannacry blackmail software attack

Wannacry blackmail software is a continuous network attack, which involves infecting Microsoft Windows with computer worms.

2. Shamoon computer virus attack

Shamoon is a computer virus that can be attributed to infection of computer systems and cyber espionage in the energy sector. PostVer 0

Please login to reply. Login

387940240qqcom • 2021-03-30 08:07:58
<a href="http://www.yvsou.com/wp-content/uploads/sites/30/2021/03/Screenshot_20210330_081233.jpg"><img class="alignnone size-medium wp-image-9419" src="http://www.yvsou.com/wp-content/uploads/sites/30/2021/03/Screenshot_20210330_081233-300x230.jpg" alt="" width="300" height="230" /></a> PostVer 0

Please login to reply. Login

2955836006qqcom • 2021-03-30 08:23:15
security online is just like the safety in real life , today most of people have some weath online. so the security online is of great significance PostVer 0

Please login to reply. Login

wx287_oz26ftx_gczjz0jpscvm1-d3flry • 2021-03-30 08:41:24
Without security for networking, everyone’s information will be exposed on the Internet. Internet is an open network without control mechanism. Hackers often invade the computer system in the network, or steal confidential data and privileges, or destroy important data, or make the system function not fully play until paralysis. The spread of computer virus through the Internet brings great harm to Internet users. The virus can paralyze the computer and computer network system, and lose data and files. The spread of virus on the network can be transmitted through public anonymous FTP file, or through mail and additional files of mail. PostVer 0

Please login to reply. Login

1772435220qqcom • 2021-04-03 13:21:43
<a href="http://yvsou.com/wp-content/uploads/2021/04/H9CWAHRJ76RAB9OGO.png"><img class="alignnone size-medium wp-image-87792" src="http://yvsou.com/wp-content/uploads/2021/04/H9CWAHRJ76RAB9OGO-300x21.png" alt="" width="300" height="21" /></a> PostVer 0

Please login to reply. Login

819354461qqcom • 2021-04-03 17:19:20
In order to make the network realize the function of resource sharing, the hardware and software of the network should run normally, and then the security of data and information exchange should be guaranteed. As can be seen from the previous two sections, the abuse of resource sharing leads to network security problems. Therefore, the technical way of network security is to implement limited sharing. PostVer 0

Please login to reply. Login

rababboug69gmailcom • 2021-04-06 06:45:07
because it helps business reduce the risk of falling victim of data theft and sabotage and it helps also on protect your workstations from harmful spyware. PostVer 0

Please login to reply. Login

rababboug69gmailcom • 2021-04-06 06:45:12
because it helps business reduce the risk of falling victim of data theft and sabotage and it helps also on protect your workstations from harmful spyware. PostVer 0

Please login to reply. Login

1115727260qqcom • 2021-04-06 11:02:37
Because we often store out important personal information in computer.Attack:virus,worm,Trojan horse,spyware and phishing. PostVer 0

Please login to reply. Login

1525693772qqcom • 2021-04-08 16:30:50
<strong>Unstructured</strong> – attacks made by unskilled hackers. Individuals behind these attacks use hacking tools available on the Internet and are often not aware of the environment they are attacking. These threats should not be neglected because they can expose precious information to malicious users. PostVer 0

Please login to reply. Login

2653815589qqcom • 2021-04-12 20:35:53
Entering the 21st century, with the rapid development of information construction and IT technology, the application of various network technology is more extensive, many network security problems at the same time, the more evident the importance of network security technology, network security has become the focus of international attention, not only relates to the organization and individual users of information resources and assets risk, It also bears on national security and social stability PostVer 0

Please login to reply. Login

2848519344qqcom • 2021-04-19 23:17:39
Involving national security. Affect economic and social stability. Infringe on the interests of the people

Password intrusion. Trojan horse. WWW deception. Node attack. Network monitoring

&nbsp; PostVer 0

Please login to reply. Login

2542886026qqcom • 2021-05-05 21:09:20
<a href="http://www.yvsou.com/wp-content/uploads/sites/30/2021/05/屏幕截图-2021-05-05-211537.jpg"><img src="http://www.yvsou.com/wp-content/uploads/sites/30/2021/05/屏幕截图-2021-05-05-211537-287x300.jpg" alt="" width="287" height="300" class="alignnone size-medium wp-image-9586" /></a> PostVer 0

Please login to reply. Login

Reversion History

Loading...
No reversions found.