Welcome to中国防火墙网
Add to Favorites | Chinese
Inbreak testing system principle and practice (1)
From;    Author:Stand originally








Inbreak testing system principle and practice (1)

IDS:THEORY&PRACTICE
Inbreak testing system: Theory and practice
Since the computer be joined begin with network means, network safety becomes a major problem, as the development of INTERNET, the requirement of safe system also grows day and day, one of its requirements inbreak namely testing system.
The article aims to introduce a few kinds to inbreak commonly testing system and its theory and practice, what need points out is, the article is a literary works that introduces a gender merely, although I recommended a lot of likely systems, before you believe its dependability, still had better be thorough research them. (NND, irritated dead I, want to knock 4 words, I was gotten with respect to abbreviation ID after. Inbreak testing system is IDS: - ) )
One, what is to inbreak detect.
Inbreak detecting is to show surveillance perhaps is below probable condition, prevent the system that inbreak or tries to control you or the sort of effort of network resource.
In short, its working way is such: You have station machine, be gotten on to the network by join, perhaps was gone to repeatedly namely on INTERNET, stem from understandable reason, you also are willing to visit the license of your system from the network to be installed by the authorized person. For instance, you have the WEB server that goes up to INTERNET with stage join, the page that is willing to make employee and client, potential client OK visit memory to go up in WEB server.
However, you are not willing those employees without accredit, client is other perhaps visit a system without the tripartite of accredit. For instance, you are not willing to design the personnel beyond personnel to be able to be revised besides the webpage of company service store the page on the machine. One of typical methods use firewall namely or system of some kind of attestation will prevent the visit without accredit.
But, below a few circumstances, simple use firewall or attestation system is OK also by breach. Inbreak detect even if such in order to plant technology, it will be right attempt to make response without the join of accredit, can resist even inbreak possibly with the part.
So,

2, why should use ID?
Gave out to use the argument of ID below:
(1) the data security that you need to protect your and system, and the fact is to be below present INTERNET environment, if you use common password and file protection means merely, you assure the security of your data and system impossibly forever.
(2) to protective data, the safety that compares a system without what is more important, want so hook up your machine INTETNET and do not make any defending, do not establish even administrator code even, with respect to the hope this machine is met uneventful, that is simply close to covet of Yu Chi heart. Same, the system is right core file or accredit database (for instance the SAM of NT is mixed of UNIX / ETC/PASSWORD or / ETC/SHADOW) protection also is very important.
Previous12 Next

About us | Legal Notices | Sitemap | Links | Partner