中共解放軍運用駭客軟體進行資訊攻擊之研析
碩士 === 國防大學理工學院 === 電子工程碩士班 === 98 === With the popularity of computers and the rapid progress of the Internet age, the military also move towards information technology. Physical isolation policy is executed in military network. A lot of expensive network management equipment are added, such as int...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/15704729731157343816 |
id |
ndltd-TW-098CCIT0428009 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098CCIT04280092015-11-09T04:05:55Z http://ndltd.ncl.edu.tw/handle/15704729731157343816 中共解放軍運用駭客軟體進行資訊攻擊之研析 Shih-Hung Liao 廖士宏 碩士 國防大學理工學院 電子工程碩士班 98 With the popularity of computers and the rapid progress of the Internet age, the military also move towards information technology. Physical isolation policy is executed in military network. A lot of expensive network management equipment are added, such as intrusion detection system, hardware firewall, security equipment ... etc., but these devices are focused on the external protection. It is not seriously enough for military to study about the software used for the attack of hackers. “Cyber Force” in Mainland China, the current organization and the ability has far exceeded ours. The U.S. military cannot hold a candle to the Mainland China for ability of network. The attack method of hackers is increasingly updated, faster and faster, more and more serious damage. Because the vulnerability of operating systems and application software have been used by many hackers. However, end users or system administrators are often omited these kinds of loopholes, so this is short-cut for hackers. The sdudy is to analyze the current global information technology security threats, and discuss the military organizations of the network and ability for Mainland China. This sdudy is to use virtual environments to simulate the environment which hackers attack and defend. Finally, to use vulnerability assessment and vulnerability scanning for software analysis system can provide administrators many applications. Te-Jen Chang 張德仁 2010 學位論文 ; thesis 87 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國防大學理工學院 === 電子工程碩士班 === 98 === With the popularity of computers and the rapid progress of the Internet age, the military also move towards information technology. Physical isolation policy is executed in military network. A lot of expensive network management equipment are added, such as intrusion detection system, hardware firewall, security equipment ... etc., but these devices are focused on the external protection. It is not seriously enough for military to study about the software used for the attack of hackers.
“Cyber Force” in Mainland China, the current organization and the ability has far exceeded ours. The U.S. military cannot hold a candle to the Mainland China for ability of network. The attack method of hackers is increasingly updated, faster and faster, more and more serious damage. Because the vulnerability of operating systems and application software have been used by many hackers. However, end users or system administrators are often omited these kinds of loopholes, so this is short-cut for hackers.
The sdudy is to analyze the current global information technology security threats, and discuss the military organizations of the network and ability for Mainland China. This sdudy is to use virtual environments to simulate the environment which hackers attack and defend. Finally, to use vulnerability assessment and vulnerability scanning for software analysis system can provide administrators many applications.
|
author2 |
Te-Jen Chang |
author_facet |
Te-Jen Chang Shih-Hung Liao 廖士宏 |
author |
Shih-Hung Liao 廖士宏 |
spellingShingle |
Shih-Hung Liao 廖士宏 中共解放軍運用駭客軟體進行資訊攻擊之研析 |
author_sort |
Shih-Hung Liao |
title |
中共解放軍運用駭客軟體進行資訊攻擊之研析 |
title_short |
中共解放軍運用駭客軟體進行資訊攻擊之研析 |
title_full |
中共解放軍運用駭客軟體進行資訊攻擊之研析 |
title_fullStr |
中共解放軍運用駭客軟體進行資訊攻擊之研析 |
title_full_unstemmed |
中共解放軍運用駭客軟體進行資訊攻擊之研析 |
title_sort |
中共解放軍運用駭客軟體進行資訊攻擊之研析 |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/15704729731157343816 |
work_keys_str_mv |
AT shihhungliao zhōnggòngjiěfàngjūnyùnyònghàikèruǎntǐjìnxíngzīxùngōngjīzhīyánxī AT liàoshìhóng zhōnggòngjiěfàngjūnyùnyònghàikèruǎntǐjìnxíngzīxùngōngjīzhīyánxī |
_version_ |
1718126601814671360 |