首页 | 本学科首页   官方微博 | 高级检索  
     

特洛伊木马入侵机制及防护措施探讨
引用本文:周金容,化希耀. 特洛伊木马入侵机制及防护措施探讨[J]. 塔里木大学学报, 2007, 19(2): 92-94,97
作者姓名:周金容  化希耀
作者单位:塔里木大学信息工程学院,新疆,阿拉尔,843300
摘    要:随着计算机网络的发展,网络安全威胁日益严重,特别是特洛伊木马的攻击越来越频繁,本文从安全防护的观念出发,对特洛伊木马概念、常用入侵机制和防护措施进行了简要分析。

关 键 词:网络  特洛伊木马  防护
文章编号:1009-0568(2007)02-0092-03
收稿时间:2006-10-10
修稿时间:2006-10-10

Trojan Invasion Mechanisms and Exploration of Protective Measures
Zhou Jinrong,Hua Xiyao. Trojan Invasion Mechanisms and Exploration of Protective Measures[J]. Journal of tarim University, 2007, 19(2): 92-94,97
Authors:Zhou Jinrong  Hua Xiyao
Affiliation:College of Information Engineering, Tarim University , Alar, Xinjiang 843300
Abstract:With the development of computer networks,network security threats become more serious,especially Trojan attacks have become increasingly frequent.In this paper the concept of security and protection,the right concept of Trojan,the invasion mechanisms and protective measures were briefly analyzed.
Keywords:networks  Trojan  protection
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号