Welcome to中国防火墙网
Add to Favorites | Chinese
Inbreak testing system principle and practice
From;    Author:Stand originally








Inbreak testing system principle and practice (1)

IDS:THEORY&PRACTICE
Inbreak testing system: Theory and practice
Since the computer be joined begin with network means, network safety becomes a major problem, as the development of INTERNET, the requirement of safe system also grows day and day,
One of its requirements inbreak namely testing system.
The article aims to introduce a few kinds to inbreak commonly testing system and its theory and practice, what need points out is, the article is a literary works that introduces a gender merely, although I was recommended,make
Much more likely system, before you believe its dependability, still had better be thorough research them. (NND, irritated dead I, want to knock 4 words, I was gotten with respect to abbreviation ID after.
Inbreak testing system is IDS: - ) )
One, what is to inbreak detect.
Inbreak detecting is to show surveillance perhaps is below probable condition, prevent the system that inbreak or tries to control you or the sort of effort of network resource.
In short, its working way is such: You have station machine, be gotten on to the network by join, perhaps was gone to repeatedly namely on INTERNET, stem from understandable reason,
You also are willing to visit the license of your system from the network to be installed by the authorized person. For instance, you have the WEB server that goes up to INTERNET with stage join, be willing to yield client, post
Member the page that can visit memory to go up in WEB server with potential client.
However, you are not willing those employees without accredit, client is other perhaps visit a system without the tripartite of accredit. For instance, you are not willing the webpage besides company service
The personnel beyond design personnel can be revised store the page on the machine. One of typical methods use firewall namely or system of some kind of attestation will prevent without accredit
Visit.
But, below a few circumstances, simple use firewall or attestation system is OK also by breach. Inbreak detect even if such in order to plant technology, it will be right without accredit even
Receive a purpose to make response, can resist even inbreak possibly with the part.
So,

2, why should use ID?
Gave out to use the argument of ID below:
(1) the data security that you need to protect your and system, and the fact is to be below present INTERNET environment, if you use common password and file protection means merely,
You assure the security of your data and system impossibly forever.
(2) to protective data, the safety that compares a system without what is more important, want so hook up your machine INTETNET and do not make any defending, connect a pipe even
Password of the member that manage is not set, with respect to the hope this machine is met uneventful, that is simply close to covet of Yu Chi heart. Same, the system is right core file or accredit database (for instance
Previous12 Next

About us | Legal Notices | Sitemap | Links | Partner