【正文】
質(zhì)、規(guī)模,已經(jīng)到了令人咋舌的地步。 The virus。 Network security attacks means analysis In this paper: This article tells the story of the hacker’s attack mon method in work security module, as well as all aspects of the analysis of these means, now some criminals begin to use work vulnerabilities and all aspects of the means to achieve their own some bad purpose, such as: stealing other’s private information and account password, listen to other’s life, online fraud , illegal ACTS such as designing a fishing website, so we have to understand and control means some hackers are necessary, in this paper, we will talk about 15 kinds of attack means, and analyze them. Keywords: work security。 關(guān)鍵詞: 網(wǎng)絡(luò)安全;黑客;黑客攻擊手段;木馬;病毒;釣魚網(wǎng)站;網(wǎng)絡(luò)監(jiān)聽;信息泄露。 Trojan。 Information disclosure. I 目 錄 第一章 引言 ........................................................ 1 研究背景 ..................................................... 1 研究方案 ..................................................... 2 第二章 概述 ........................................................ 3 網(wǎng)絡(luò)安全特性 ................................................. 3 相對(duì)性 ................................................. 3 攻擊的不確定性 ......................................... 3 復(fù)雜性 ................................................. 3 時(shí)效性 ................................................. 3 配置相關(guān)性 ............................................. 3 動(dòng)態(tài)性 ................................................. 3 黑客概念 ..................................................... 4 常見黑客攻擊手段分析 ......................................... 4 欺騙網(wǎng)絡(luò)攻擊 ........................................ 4 欺騙攻擊 ............................................. 5 攻擊電腦硬件系統(tǒng) ....................................... 5 獲取口令 ............................................... 6 放置木馬、病毒程序 ..................................... 6 電子郵件攻擊 ........................................... 6 通過(guò)一個(gè)節(jié)點(diǎn)來(lái)攻擊其他節(jié)點(diǎn) ............................. 7 網(wǎng)絡(luò)監(jiān)聽 ............................................... 7 尋找系統(tǒng)漏洞 ........................................... 7 利用帳號(hào)進(jìn)行攻擊 ...................................... 7 偷取特權(quán) .............................................. 7 緩沖區(qū)溢出攻擊 ........................................ 8 對(duì)防火墻的攻擊 ........................................ 8 后門攻擊 .............................................. 8 II 信息戰(zhàn) ................................................ 8 拒絕服務(wù)攻擊 .......................................... 8 致 謝 ............................................................ 10 參考文獻(xiàn) .......................................................... 10