目 录
摘要...................................................................................................................................................................I
Abstract...........................................................................................................................................................II
目录 ................................................................................................................................................................III
绪 论 ..............................................................................................................................................................1
第一章 计算机网络安全的概述 ....................................................................................................................2
1.1 计算机网络安全的简介 ....................................................................................................................2
1.2 计算机网络安全的定义 ....................................................................................................................2
1.3 计算机网络安全的属性 ...................................................................................................................3
1.4 计算机网络安全机制 .......................................................................................................................3
1.5 个人计算机网络存在的安全隐患 ...................................................................................................4
第二章 windows 操作系统安全...................................................................................................................5
2.1 操作系统安全定义 ............................................................................................................................5
2.2 windows 系统安全架构.....................................................................................................................5
2.3 windows 系统安全组件.....................................................................................................................5
2.4 Windows 的访问控制过程................................................................................................................6
2.5 Windows 安全存在缺陷.................................................................................................................6
第三章 个人计算机安全配置及防范 ..........................................................................................................7
3.1 系统的安装 ........................................................................................................................................7
3.2 系统用户管理和登录 ........................................................................................................................7
3.2.1 系统用户帐号 ........................................................................................................................7
3.2.2 加强密码安全及设置密码规则 ............................................................................................7
3.3 系统的安全配置 ...............................................................................................................................8
3.3.1Windows 系统安全设置.........................................................................................................8
3.3.2 账户安全策略设置 .................................................................................................................8
3.3.3 安全审核 ...............................................................................................................................10
3.3.4 Windows 注册表分析与维护...............................................................................................11
3.3.5 关闭不必要的端口 ...............................................................................................................13
第四章 病毒防护 ........................................................................................................................................14
4.1 计算机病毒的定义 ..........................................................................................................................14
4.2 计算机病毒的组成与分类 .............................................................................................................14
4.3 病毒的检测、清除和防范 .............................................................................................................15
4.3.1 病毒的检测 ...........................................................................................................................15
4.3.2 病毒的清除 ...........................................................................................................................15
4.3.3 计算机病毒的防范 ...............................................................................................................17
结论 ................................................................................................................................................................19
致谢 ................................................................................................................................................................20
参考文献 ........................................................................................................................................................21