找回密码
 立即注册
andnetwork二层The | 企业管理 2022-09-12 117 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
以上所说到的攻击和欺骗行为首要来自网络的第二层。在网络实际环境中,其来历可综合为两个路径:人为施行,病毒或蠕虫。人为施行通常是指使用一些黑k的工具对网络进行扫描和嗅探,获取管理帐户和相关密码,在网络上中安插木马,然后进行进一步盗取机密文件。攻击和欺骗进程通常对比荫蔽和安静,但关于信息安全要求高的企业损害是极大的。木马、蠕虫病毒的攻击不仅仅是攻击和欺骗,同时还会带来网络流量加大、设备CPU利用率过高、二层生成树环路、网络瘫痪等景象。
本资料共包括以下附件:
二层攻击介绍以及防范方法.pdf
包括多个文件,请自行下载检测!


(The attacks and deceptions mentioned above mainly come from the second layer of the network. In the actual network environment, its origin can be integrated into two paths: human execution, virus or worm. Human execution usually refers to using some hacker's tools to scan and sniff the network, obtain management accounts and related passwords, install Trojan horses on the network, and then further steal confidential documents. The attack and deception process is usually relatively shadowy and quiet, but the damage to enterprises with high information security requirements is great. Trojan and worm attacks are not only attacks and deceptions, but also bring about increased network traffic, high CPU utilization of devices, L2 spanning tree loops, and network paralysis.
This document includes the following attachments:
Layer 2 attack introduction and prevention methods.pdf
Including multiple files, please download and test by yourself!)

[下载]16144479220.rar




上一篇:穿透防火墙的远程控制软件
下一篇:电信贝尔RG100A-bA 开路由