中共解放軍運用駭客軟體進行資訊攻擊之研析

碩士 === 國防大學理工學院 === 電子工程碩士班 === 98 === With the popularity of computers and the rapid progress of the Internet age, the military also move towards information technology. Physical isolation policy is executed in military network. A lot of expensive network management equipment are added, such as int...

Full description

Bibliographic Details
Main Authors: Shih-Hung Liao, 廖士宏
Other Authors: Te-Jen Chang
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/15704729731157343816
Description
Summary:碩士 === 國防大學理工學院 === 電子工程碩士班 === 98 === With the popularity of computers and the rapid progress of the Internet age, the military also move towards information technology. Physical isolation policy is executed in military network. A lot of expensive network management equipment are added, such as intrusion detection system, hardware firewall, security equipment ... etc., but these devices are focused on the external protection. It is not seriously enough for military to study about the software used for the attack of hackers. “Cyber Force” in Mainland China, the current organization and the ability has far exceeded ours. The U.S. military cannot hold a candle to the Mainland China for ability of network. The attack method of hackers is increasingly updated, faster and faster, more and more serious damage. Because the vulnerability of operating systems and application software have been used by many hackers. However, end users or system administrators are often omited these kinds of loopholes, so this is short-cut for hackers. The sdudy is to analyze the current global information technology security threats, and discuss the military organizations of the network and ability for Mainland China. This sdudy is to use virtual environments to simulate the environment which hackers attack and defend. Finally, to use vulnerability assessment and vulnerability scanning for software analysis system can provide administrators many applications.