高校网络攻防安全浅析——以伊犁师范大学为例
An Analysis of Network Attack and Defense Security in Colleges and Universities—Taking Yili Normal University as an Example
摘要: 随着信息技术的飞速发展,互联网已经深入人心,网络安全问题也相伴而生,针对高校信息基础设施的网络事件频发,侵犯个人隐私,窃取个人信息,网络诈骗等违法犯罪依然猖獗,网络安全的威胁来源和供给手段也在不断变化,网路攻击和防护是矛和盾的较量,只有深入了解网络攻击的技术方法和攻击路径,才能知己知彼,百战不殆。本文结合攻防演练中常用的攻击和防御手段,从攻防两端视角总结校园网攻击的路径和防护手段,助力高校一站式适配多种安全风险场景,构建实时自适应安全防护能力,搭建以人员和业务为核心的安全体系,全面提升校园网络安全,促进高校数字化安全转型。
Abstract:
With the rapid development of information technology, the Internet has been deeply rooted in people’s hearts, network security issues are also accompanied by the frequent occurrence of network incidents against the university information infrastructure, invasion of personal privacy, theft of personal information, network fraud and other crimes are still rampant, network security threat sources and means of supply are also constantly changing, network attacks and protection is a battle of spears and shields, only an in-depth understanding of network attack techniques and attack paths can know the enemy and know ourselves. Only with an in-depth understanding of the technology of network attacks and attack paths can we know ourselves and the enemy and not be in danger. This paper combines the attack and defense means commonly used in attack and defense drills to summarize the path of campus network attack and protection means from the perspective of both attack and defense, to comprehensively enhance campus network security, to promote the digital transformation of schools, and to provide a reference for the reinforcement of campus network security in the biased areas.
参考文献
|
[1]
|
吴楠青, 刘后丞, 权华, 等. 攻防演习中从攻击方角度分析防守方可采取的应对措施[J]. 网络安全技术与应用, 2023(7): 1-2.
|
|
[2]
|
刘秋尘. 网络安全攻防演练中攻防双方技术概述[J]. 现代电视技术, 2023(6): 156-158 117.
|
|
[3]
|
刘志军, 戴高远, 田葆, 等. 域名系统风险分析及安全防护架构[J]. 广东通信技术, 2023, 43(8): 42-45.
|
|
[4]
|
闫丽丽. 基于Python技术的校园网搜索引擎设计[J]. 信息与电脑(理论版), 2023, 35(17): 183-185.
|
|
[5]
|
邓东林. 网络安全攻防演练中的防守方案设计[J]. 网络安全和信息化, 2022(9): 109-113.
|
|
[6]
|
王晟, 张通凯, 李超峰. 网络安全漏洞管理与漏洞情报库建设分析[J]. 电信工程技术与标准化, 2023, 36(12): 65-68 81. [Google Scholar] [CrossRef]
|
|
[7]
|
韦娟, 徐建军. 校园网络安全“管理 运维”体系探索[J]. 网络安全技术与应用, 2024(1): 87-89.
|
|
[8]
|
田嘉豪, 胡吉祥. 等级保护2.0中渗透测试技术的研究[J]. 网络安全技术与应用, 2024(1): 11-12.
|
|
[9]
|
马宜东. 在攻防演练中提升网络防御能力[J]. 网络安全和信息化, 2023(4): 48-50.
|
|
[10]
|
张荣鑫. 如何组织一场网络安全攻防演练[J]. 保密工作, 2023(5): 56. [Google Scholar] [CrossRef]
|
|
[11]
|
杜金朋, 梁婷婷. 网络安全攻防技术在实际业务系统中的应用[J]. 网络安全和信息化, 2024(2): 117-119.
|
|
[12]
|
张耕源. 论网络空间安全与攻防技术[J]. 信息系统工程, 2023(12): 137-140.
|