中共解放軍運用駭客軟體進行資訊攻擊之研析

碩士 === 國防大學理工學院 === 電子工程碩士班 === 98 === With the popularity of computers and the rapid progress of the Internet age, the military also move towards information technology. Physical isolation policy is executed in military network. A lot of expensive network management equipment are added, such as int...

Full description

Bibliographic Details
Main Authors: Shih-Hung Liao, 廖士宏
Other Authors: Te-Jen Chang
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/15704729731157343816
id ndltd-TW-098CCIT0428009
record_format oai_dc
spelling ndltd-TW-098CCIT04280092015-11-09T04:05:55Z http://ndltd.ncl.edu.tw/handle/15704729731157343816 中共解放軍運用駭客軟體進行資訊攻擊之研析 Shih-Hung Liao 廖士宏 碩士 國防大學理工學院 電子工程碩士班 98 With the popularity of computers and the rapid progress of the Internet age, the military also move towards information technology. Physical isolation policy is executed in military network. A lot of expensive network management equipment are added, such as intrusion detection system, hardware firewall, security equipment ... etc., but these devices are focused on the external protection. It is not seriously enough for military to study about the software used for the attack of hackers. “Cyber Force” in Mainland China, the current organization and the ability has far exceeded ours. The U.S. military cannot hold a candle to the Mainland China for ability of network. The attack method of hackers is increasingly updated, faster and faster, more and more serious damage. Because the vulnerability of operating systems and application software have been used by many hackers. However, end users or system administrators are often omited these kinds of loopholes, so this is short-cut for hackers. The sdudy is to analyze the current global information technology security threats, and discuss the military organizations of the network and ability for Mainland China. This sdudy is to use virtual environments to simulate the environment which hackers attack and defend. Finally, to use vulnerability assessment and vulnerability scanning for software analysis system can provide administrators many applications. Te-Jen Chang 張德仁 2010 學位論文 ; thesis 87 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防大學理工學院 === 電子工程碩士班 === 98 === With the popularity of computers and the rapid progress of the Internet age, the military also move towards information technology. Physical isolation policy is executed in military network. A lot of expensive network management equipment are added, such as intrusion detection system, hardware firewall, security equipment ... etc., but these devices are focused on the external protection. It is not seriously enough for military to study about the software used for the attack of hackers. “Cyber Force” in Mainland China, the current organization and the ability has far exceeded ours. The U.S. military cannot hold a candle to the Mainland China for ability of network. The attack method of hackers is increasingly updated, faster and faster, more and more serious damage. Because the vulnerability of operating systems and application software have been used by many hackers. However, end users or system administrators are often omited these kinds of loopholes, so this is short-cut for hackers. The sdudy is to analyze the current global information technology security threats, and discuss the military organizations of the network and ability for Mainland China. This sdudy is to use virtual environments to simulate the environment which hackers attack and defend. Finally, to use vulnerability assessment and vulnerability scanning for software analysis system can provide administrators many applications.
author2 Te-Jen Chang
author_facet Te-Jen Chang
Shih-Hung Liao
廖士宏
author Shih-Hung Liao
廖士宏
spellingShingle Shih-Hung Liao
廖士宏
中共解放軍運用駭客軟體進行資訊攻擊之研析
author_sort Shih-Hung Liao
title 中共解放軍運用駭客軟體進行資訊攻擊之研析
title_short 中共解放軍運用駭客軟體進行資訊攻擊之研析
title_full 中共解放軍運用駭客軟體進行資訊攻擊之研析
title_fullStr 中共解放軍運用駭客軟體進行資訊攻擊之研析
title_full_unstemmed 中共解放軍運用駭客軟體進行資訊攻擊之研析
title_sort 中共解放軍運用駭客軟體進行資訊攻擊之研析
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/15704729731157343816
work_keys_str_mv AT shihhungliao zhōnggòngjiěfàngjūnyùnyònghàikèruǎntǐjìnxíngzīxùngōngjīzhīyánxī
AT liàoshìhóng zhōnggòngjiěfàngjūnyùnyònghàikèruǎntǐjìnxíngzīxùngōngjīzhīyánxī
_version_ 1718126601814671360