网络安全与防火墙 英文文献翻译
- 格式:doc
- 大小:121.00 KB
- 文档页数:6
网络安全技术英语With the rapid development of information technology, the Internet has become an indispensable tool in our lives, bringing us great convenience. However, along with the convenience, we also face various risks and threats. Therefore, it is necessary to improve our network security technology.First of all, a strong firewall is essential for network security. A firewall is like a protective shield that stands between our computer and the Internet. It helps to filter out and block malicious attacks, such as viruses, worms, and Trojans. By analyzing the data packets and monitoring the network traffic, the firewall can identify suspicious activities and take prompt actions to prevent intrusion.Secondly, using encryption technology is another effective way to enhance network security. Encryption is the process of converting plain text into cipher text, which is not readily understandable by unauthorized users. By applying encryption algorithms, sensitive information, such as passwords and credit card numbers, can be securely transmitted over the network. Even if the data is intercepted, it is extremely difficult for hackers to decrypt and obtain the original content.In addition, regularly updating the system and software is crucial for network security. Software developers release updates and patches to fix vulnerabilities and bugs that can be exploited by hackers. By keeping our system and software up to date, we can prevent potential security breaches and ensure the smooth operation of our network. It is also important to install antivirussoftware and scan the system regularly to detect and remove any malware that may have been accidentally downloaded.Furthermore, using strong and unique passwords is a fundamental measure to protect our network security. Weak passwords, such as simple words or numbers, are easily cracked by brute-force attacks. To create a strong password, it is recommended to use a combination of uppercase and lowercase letters, numbers, and special characters. It is also advisable to change passwords regularly and avoid reusing passwords for different accounts.Lastly, educating and raising awareness among users is essential for network security. Many security breaches are caused by human error, such as clicking on phishing links or opening suspicious email attachments. Therefore, it is important to educate users on how to identify and avoid potential threats. Regular training sessions and workshops can provide users with the necessary knowledge and skills to protect themselves and their networks.In conclusion, network security plays a vital role in our daily lives. By implementing strong firewalls, encryption technology, updating systems and software, using strong passwords, and raising awareness among users, we can effectively enhance our network security and protect ourselves from various risks and threats.。
网络安全倡议书英文范文English:As the world becomes more interconnected through technology, the importance of cybersecurity cannot be emphasized enough. It is no longer sufficient to rely on strong passwords and firewalls to protect our personal and business data. Cybercriminals are becoming increasingly sophisticated and their attacks are becoming more frequent and devastating. It is essential that we all take responsibility for our own cybersecurity and make sure we are taking all necessary precautions to keep ourselves and our information safe online. The first step is education. We need to take the time to learn about the latest threats and how to protect ourselves against them. We should also encourage others to do the same. Additionally, we must ensure that our devices are up to date with the latest security patches and that we are using strong, unique passwords for each of our accounts. We should also be cautious when clicking on links or downloading attachments from unknown sources. Lastly, we must remember that cybersecurity is a team effort. We need to work together as a community to report any suspicious activities and to hold those whoconduct cyberattacks accountable. It is only through collaboration and a shared commitment to cybersecurity that we can ensure a safe and secure online world both now and in the future.中文翻译:随着世界变得越来越多地通过技术相互连接,网络安全的重要性不容忽视。
Network Security: Challenges andStrategies in the Digital AgeIn the modern era of digitization, network security has become a paramount concern for individuals, organizations, and governments alike. The escalating use of the internet and interconnected devices has led to an exponential growth in cyber threats, ranging from simple phishing attacks to complex ransomware assaults. This evolving landscape poses significant challenges to maintaining a secure digital environment.One of the primary challenges in network security is the constant evolution of cyber threats. As technology advances, hackers and cybercriminals develop increasingly sophisticated methods to infiltrate systems and steal sensitive information. These threats are not limited to traditional computing devices but extend to mobile phones, IoT devices, and even critical infrastructure systems. The diversity and complexity of these threats require a comprehensive and multi-faceted approach to network security.Moreover, the globalization of the internet has made it easier for cybercriminals to operate anonymously and across borders. This has led to an increase in cybercrime activities, including cyber-espionage, fraud, and terrorism. The ability to launch attacks remotely and quickly has made it difficult for law enforcement agencies to track and prosecute these criminals.To address these challenges, it is crucial to adopt a proactive approach to network security. This involves implementing robust security measures, including firewalls, antivirus software, and encryption technologies. Additionally, regular security audits and updates are essential to identify and address vulnerabilities in systems. It is also important to educate users about cyber threats and how to protect themselves online.Furthermore, collaboration between governments, organizations, and individuals is key to building a secure digital ecosystem. Governments can establish regulatory frameworks and policies to govern cyberspace and promote cooperation between law enforcement agencies. Organizations can share information about cyber threats and bestpractices to enhance their collective defense. Individuals, on the other hand, can play a role by being vigilant and responsible online citizens.In conclusion, network security is a complex and evolving field that requires constant vigilance and innovation. By addressing the challenges posed by cyber threats and adopting proactive security measures, we can build a safer and more secure digital world.**网络安全:数字时代的挑战与策略**在数字化的现代时代,网络安全已成为个人、组织及政府共同面临的重要关切。
Research of Network Security and Firewalls Techniques Abstract:As the key facility that maintains the network security , firewalls take the purpose of establishing an obstacle between trust and trustless network, and put corresponding safety strategy into practice. In this paper , the computer network security and the techniques of firewalls were mainly discussed, the concept and classification of the firewalls were introduced. It also introduced three kind's of basic implement techniques of the firewalls: Packet filtering , Application Proxy and Monitor model in detail. Finally described the trend of development of the firewalls techniques in Internet briefly.Key words: network security, firewalls, Packet filtering, monitor1. IntroductionNow with the computer network and e-commerce used widely, network security has become an important problem that we must consider and resolve. More and more professions. enterprises and individuals surfer from the security problem in different degree. they are looking for the more reliable safety solution . In the defense system adopted by network security at present, the firewalls stand the very important position.As the key facility that maintains the network security. firewalls take the purpose of establishing an obstacle between trust and trustless network, and put corresponding safety strategy into practice.All the firewalls have the function to filter the IP address. This task checks the IP packet, makes the decision whether to release or to abandon it according to the source address and destination address of the IP. Shown in Fig.I, there is a firewall between two network sections, an UNIX computer is on one side of the firewall, and the other side is a PC client. While the PC client asks a telnet request for the UNIX computer, the client procedure of telnet in the PC produces a TCP packet and passes the packet to the local protocol stack to prepare to send. The protocol stack fills it in one IP packet. then, sends it to UNIX computer through the path defined by the TCP/IP stack of PC. The IP packet can't reach the UNIX computer until it passes the firewall between the PC and the UNIX computer.Fig. I Ip Address FilteringThe application firewall is a very efficient means of network security on Internet,it is installed between the trust and trustless network, can isolate the connection between the trust and trustless network, and doesn't hamper people's access to the trustless network at the same time. It can isolate the connection between the risk area (namely there may be a certain risk on Internet) and the safe area (LAN), and doesn't hamper people's access to the risk area at the same time. Firewall can monitor the traffic flowing in and out from the network to finish the task seemingly impossible;it only allows the safe and checked information to enter into, and meanwhile resists on the data that may bring about the threat to enterprise. As the fault and defect of the security problem becomemore and more general, the invasion to the network not only comes from the super attack means, but also may be from the lower-level mistakes or improper password selections on the configuration. So, the function of the firewalls is preventing the communication that not hoped and authorized passes in and out of the network protected. forcing the companies to strengthen their own network security policy. The general firewalls can achieve the following purposes: First, restraining others from entering the inside network, filtering the unsafe service and illegal user; Second, preventing the invaders from closing to your defense installation; Third,limiting the user to access the special site; Fourth,providing convenience for monitoring the Internet security.2. The classification and implement technology of firewallsAn integrated firewalls system usually consists of screening router and proxy server. The screening router is a multi-port IP router. it check the each coming IP packet according to the group regular to judge whether to transmit it. The screening router gets information from the packet. fot example the protocol number. the IP address and port number that receiving and sending massages. the flag of link even some other IP selections. filtering IP packet. The proxy server are server process in the firewall. it can replace the network user to finish the specific TCP/IP function. A proxy server is naturally a gateway of application layer. a gateway of two networks joined specific network application. Users contact with proxy server by one of the TCP/IP application such as Telnet or FTP. the proxy server ask the users for the name of the remote host. which users want to access. After the users have answered and offered the correct users' identities and authentication information, the proxy server communicates the remote host, act as the relay between two communication sites. The whole course can be totally transparent to users.There are mainly three types in the firewalls: packet filtering. application gateways and state detection.Packet filtering firewall works on the network layer.it can filter the source address. destination address. source port and destination port of TCP/IP data packet. It has advantages such as the higher efficiency.transparent to user. and users might not feel the existence of the packer filtering firewall, unless he is the illegal user and has been refused. The shortcomings are that it can't ensure the security to most services and protocols, unable to distinguish the different users of the same IP address effectively,and it is difficult to be configured, monitored and managed. can't offer enough daily records and warning.The application gateways firewall performs its function on the application layer, it connects with specific middle-joint (firewall) by a client procedure, and then the middle-joint connects with the server actually. Unlike the packet filtering firewall. when using the firewall of this kind. there is no direct connection between the outside networks. so even if the matter has happened in the firewall. the outside networks can't connect with networks protected. The application gateway firewall offers the detailed daily records and auditing function, it improved the security of the network greatly. and provides the possibility to improve the security performance of the existing software too. The application gateways firewall solves the safety problem based on the specific application program. the products based on Proxy will be improved to configure the service in common use and non-standard port. However. so long as the application program needs upgrading. the users based on Proxy will find that they must buy new Proxy server. As a technique of network safety. Firewall combined with proxy server has simple and practical characteristics, can reach a certain security request in case of not revising the original network application system. However. if the firewall system is broken through. the network protected is in having no state of protecting. Andif an enterprise hopes to launch the business activity on Internet and carry on communication with numerous customers. it can't meet the demands. In addition, the firewall based on Proxy Service will often makes the performance of the network obviously drop.The third generation of firewall takes the detection technique of state as the core, combines the packet filtering firewall and application gateways firewall. The state detection firewall accesses and analyzes the data achieved from the communication layer through the module of state detection to perform its function. The state monitor act as firewall technique. it is best in security perfonnance, it adopts a software engine.which executes the tactics of network security on the gateways, called the detection module. On the premise of not influencing the network to work normally, detection module collects the relevant data to monitor each of the network communication layers, collects a part of data, namely status information, and stores the data up dynamically for the reference in making security decision afterward. Detection modulesupports many kinds of protocols and application program, and can implement the expansion of application and service very easily. Different from other safety schemes, before the user's access reaches the operating system of network gateways, the state monitor should collect the relevant data to analyze, combine network configuration and safety regulation to make the decisions of acceptance, refutation, appraisal or encrypting to the communication etc Once a certain access violates the security regulation, the safety alarm will refuse it and write down to report the state of the network to the system management device. This technology has defects too, namely the configuration of the state monitor is very complicated, and will decelerate the network.3. New generation technique of firewallsAccording to the present firewalls market, the domestic and international manufacturers of firewall can all support the basic function of the firewall well,including access control, the network address transform, proxy, authentication, daily records audit etc. However, as stated before, with the attack to the network increasing, and user's requisition for network security improving day by day, the firewall must get further development. Combine the present experience of research and development and the achievement,some relevant studies point out, according to the development trend of application and technology, how to strengthen the security of firewall, improve the performance of firewall, enrich the function of firewall, will become the problem that the manufacturer of firewalls must face and solve next.The purpose of the new generation firewall is mainly combining the packet filtering and proxy technology, overcoming the defects in the safety respect of two; being able to exert the omnidirectional control from the layer of data chain to the application layer; implementing the micro-kernel of TCP/IP protocol to perform all the security control on the layer of TCP/IP protocol; based on the micro-kernel above, making the speed to exceed thetraditional packet filtering firewall; Offering the transparent mode of proxy. lightening the configuration work on the client; Supporting the data encryption and decryption (DES and RSA ), offering the strong support to the Virtual Private Network VPN; hiding the Inside information totally; producing a new firewall theory.The new techniqe of firewalls has not only covered all the functions of traditional packet filtering firewalls, but also has remarkable advantages in opposing overall the attack means of IP deception, SYN Flood, ICMP. ARP, etc. strengthening proxy service, merging it with packet filtering, then adding the intelligence filtering technology to make the security of the firewall rising to another height.4. ConclusionNow the firewall has already been widely used on Internet, and because of its characteristic of not limited to the TCP/IP protocol, it has more vitality outside Internet progressively too. To be subjective, the firewall is not the omnipotent prescription of solving the problem of network security, but only a component of the network security policy and tactics. However, understanding the technology of firewall and learning to use it in actual operation, believing that every net friend may be benefited a lot from the network life in the new century.外文资料翻译译文摘要:作为关键设施,维护网络的安全性,防火墙采取建立信任与不可靠的网络障碍的目的,并落实相应的安全策略。
网络安全范文英语English:In today's digital age, cybersecurity has become a critical concern for individuals, organizations, and even nations. The increasing reliance on technology and connectivity has opened up numerous vulnerabilities and potential threats that can compromise sensitive data and disrupt operations. Cyberattacks have become more sophisticated, with hackers constantly finding new methods to exploit weaknesses. As a result, ensuring network security has become a top priority.To effectively address network security challenges, organizations must implement robust cybersecurity measures. This includes regular security audits and risk assessments to identify vulnerabilities and weaknesses in their systems. They should also establish and enforce strong passwords and access controls, ensuring that only authorized personnel can access sensitive information. Additionally, organizations need to invest in robust firewalls, antivirus software, and intrusion detection systems to detect and prevent unauthorized access attempts.User education and awareness also play a crucial role in maintaining network security. Employees should be trained on best practices for using technology and recognizing potential security threats, such as phishing emails or suspicious websites. Regular training sessions and awareness campaigns can help employees stay up-to-date with the latest cybersecurity trends and techniques. Moreover, organizations should regularly update their systems and software to patch any vulnerabilities and protect against emerging threats.Collaboration and information sharing are vital in addressing network security issues. Organizations should actively cooperate with industry partners, government agencies, and law enforcement to share threat intelligence and best practices. This interchange of information enables a proactive and coordinated response to emerging cyber threats. Moreover, international cooperation is essential as cybercrime knows no borders, and cross-border collaboration is crucial in combating cyber threats that have global reach.In conclusion, network security is of utmost importance in today's interconnected world. Organizations must invest in robust cybersecurity measures, educate their employees, and actively collaborate with partners and agencies to effectively address cybersecurity challenges. By doing so, we can ensure the protectionof our valuable data and maintain the integrity and availability of our networks.中文翻译:在当今数字化时代,网络安全已成为个人、组织乃至国家的重大关切。
网络安全的英语写作In recent years, with the rapid advancement of technology and the widespread use of the internet, the issue of network security has become increasingly prominent. Network security refers to measures taken to protect computer systems and the information they store from unauthorized access, use, disclosure, disruption, modification, or destruction. It is of utmost importance as it directly impacts the privacy, integrity, and reliability of digital data.One major threat to network security is hacking. Hackers, with their technical skills and knowledge, exploit vulnerabilities in computer systems to gain unauthorized access to sensitive information. This can have severe consequences, as hackers can steal personal data, financial information, or even launch cyberattacks that disrupt essential services.A common form of hacking is phishing. Phishing involves tricking individuals into revealing their personal information, such as bank account details or login credentials, by posing as a trustworthy source. Phishing attacks often occur through email, where unsuspecting users click on malicious links or download infected attachments. To protect against phishing attacks, it is crucial to be vigilant and verify the authenticity of communication before disclosing any personal information.Malware is another significant threat to network security. Malware, short for malicious software, includes computer viruses, worms, Trojan horses, ransomware, and spyware. It can be unintentionally downloaded through infected software, email attachments, or dubious websites. Once installed, malware can compromise thesecurity of a computer system and lead to data leaks, system failures, and unauthorized access. To mitigate the risk of malware, it is essential to regularly update operating systems and applications, use reputable antivirus software, and avoid downloading files from untrustworthy sources.In addition to hacking and malware, network security is also compromised by weak or easily guessable passwords. Many individuals use simple passwords such as "123456" or their birthdates, making it easy for hackers to gain unauthorized access to their accounts. To enhance password security, users should create complex passwords with a combination of uppercase and lowercase letters, numbers, and special characters. It is also advisable to enable multi-factor authentication for additional protection.Public Wi-Fi networks pose yet another risk to network security. While convenient, public Wi-Fi networks are often unsecured, making it easier for hackers to intercept communication and gain access to personal information. When connecting to public Wi-Fi networks, it is important to avoid accessing sensitive information and use a VPN (Virtual Private Network) for added security.In conclusion, network security is a critical concern in our increasingly interconnected world. To protect against hacking, individuals should be cautious of phishing attempts and regularly update their software. Additionally, strong passwords and secure Wi-Fi connections are essential components of maintaining network security. By being proactive and implementing thesemeasures, we can safeguard our digital identities and ensure the security of our sensitive information.。
网络安全英语例句带翻译1. Cybersecurity is of paramount importance in today's digital age, as cyber threats continue to evolve and become more sophisticated. (网络安全在当今数字时代至关重要,因为网络威胁不断演变并变得更加复杂。
)2. It is crucial for individuals and organizations to be vigilant against cyber attacks, such as phishing scams and malware infections. (个人和组织必须警惕网络攻击,如钓鱼诈骗和恶意软件感染。
)3. The unauthorized access to confidential information can have significant consequences, including financial loss, reputational damage, and legal liabilities. (未经授权访问机密信息可能导致重大后果,包括财务损失、声誉损害和法律责任。
)4. Strong passwords are one of the basic measures to protect against unauthorized access, and regular password changes are recommended to enhance security. (强密码是防止未经授权访问的基本措施之一,建议定期更改密码以增强安全性。
)5. Firewalls and antivirus software are essential tools in defending against malicious software and preventing unauthorized network access. (防火墙和防病毒软件是防御恶意软件和防止未授权网络访问的必备工具。
网络安全英语作文With the rapid development of the Internet, network security has become a major concern for individuals and organizations alike. In today's digital age, the threat of cyber attacks, data breaches, and online fraud is more prevalent than ever. Therefore, it is essential for everyone to be aware of the importance of network security and take proactive measures to protect themselves and their information.First and foremost, it is crucial for individuals to understand the various types of cyber threats that exist. These include malware, phishing scams, ransomware, andsocial engineering attacks, among others. By being aware of these threats, individuals can better safeguard themselves against potential risks and take appropriate precautions to prevent falling victim to cyber attacks.In addition to understanding the threats, individuals should also take steps to secure their devices and networks.This includes installing antivirus software, using strong and unique passwords, enabling two-factor authentication, and keeping software and operating systems up to date. By implementing these measures, individuals can significantly reduce their vulnerability to cyber attacks and protect their personal information from being compromised.Furthermore, organizations must also prioritize network security to safeguard their sensitive data and maintain the trust of their customers. This involves implementing robust security measures, such as firewalls, intrusion detection systems, and encryption, to protect their networks from unauthorized access and malicious activities. Additionally, organizations should conduct regular security audits and employee training to ensure that everyone is aware of the best practices for maintaining network security.Moreover, with the increasing use of cloud services and remote work, it is important for organizations to secure their data and networks in these environments as well. This includes using secure connections, implementing access controls, and regularly monitoring and managing thesecurity of cloud-based systems. By doing so, organizations can mitigate the risks associated with cloud computing and remote work and ensure the confidentiality, integrity, and availability of their data.In conclusion, network security is a critical aspect of our digital lives and requires the collective effort of individuals and organizations to address. By understanding the various cyber threats, implementing security measures, and prioritizing network security, we can all contribute to creating a safer and more secure online environment. Ultimately, by taking proactive steps to protect ourselves and our information, we can minimize the risks of cyber attacks and enjoy the benefits of the Internet with peace of mind.。
英汉网络安全词典英汉网络安全词典1. antivirus software / 杀毒软件Antivirus software, also known as anti-malware software, is a program designed to detect, prevent and remove malicious software from a computer or network.2. firewall / 防火墙A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. It helps protect a computer or network from unauthorized access and potential threats.3. encryption / 加密Encryption is the process of converting plain text or data into an unreadable format using an algorithm and a key. It helps protect sensitive information and ensures secure communication.4. phishing / 钓鱼Phishing is a fraudulent practice where cybercriminals try to trick individuals into revealing sensitive information, such as passwords or credit card numbers, by pretending to be a legitimate entity.5. malware / 恶意软件Malware, short for malicious software, is any software designed to cause damage, disrupt operations, or gain unauthorized access to a computer or network. Common types of malware include viruses, worms, trojans, and ransomware.6. vulnerability / 漏洞A vulnerability is a weakness or flaw in a computer system or network that can be exploited by attackers. It can result in unauthorized access, data breaches, or system disruptions.7. authentication / 身份验证Authentication is the process of verifying the identity of an individual or device accessing a computer system or network. It can involve passwords, biometrics, or other means to ensure the authorized user's identity.8. intrusion detection system (IDS) / 入侵检测系统An intrusion detection system is a network security technology that monitors network traffic for malicious activity or unauthorized access. It alerts administrators or automatically takes action to prevent further damage.9. encryption key / 加密密钥An encryption key is a piece of information used in encryption algorithms to convert plain text into cipher text or vice versa. The key is necessary to decrypt the encrypted data and ensure secure communication.10. cybersecurity / 网络安全Cybersecurity refers to the practice of protecting computer systems, networks, and data from unauthorized access, damage, or theft. It involves implementing measures to prevent, detect, and respond to cyber threats.11. two-factor authentication (2FA) / 双因素身份验证Two-factor authentication is a security process that requires two different forms of identification before granting access to a computer system or network. It typically involves something the user knows (password) and something the user possesses (security token or mobile device).12. data breach / 数据泄露A data breach is an incident where unauthorized individuals gain access to protected or sensitive data without permission. It can result in the exposure or theft of personal information, financial records, or other confidential data.13. cyber attack / 网络攻击A cyber attack is an intentional act to compromise computer systems, networks, or devices by exploiting vulnerabilities. It can involve stealing sensitive data, disrupting operations, or causing damage to digital infrastructure.14. vulnerability assessment / 漏洞评估A vulnerability assessment is the process of identifying and evaluating vulnerabilities in a computer system, network, or application. It helps organizations understand their security weaknesses and take appropriate measures to mitigate risks.15. secure socket layer (SSL) / 安全套接字层Secure Socket Layer is a cryptographic protocol that ensures secure communication over a computer network. It provides encryption, authentication, and integrity, making it widely used for securing online transactions and data transfer.以上是英汉网络安全词典的部分词汇,以供参考。
合理使用网络保护个人信息安全的英语作文English: The reasonable use of the internet is essential in protecting personal information security. It is important to be mindful of the information we share online, whether it be on social media, shopping websites, or even through emails. Implementing strong, unique passwords for each online account can also help safeguard against potential cyber threats. Additionally, being cautious of phishing scams and fraudulent websites is crucial in preventing personal information from being compromised. Utilizing security tools such as firewalls and antivirus software can provide an added layer of protection. It is also advisable to regularly update and patch software and operating systems to ensure they are equipped with the latest security features. By being proactive and responsible in our online behavior, we can actively contribute to the protection of our personal information security.中文翻译: 合理使用互联网对保护个人信息安全至关重要。
Research of Network Security and Firewalls Techniques Abstract:As the key facility that maintains the network security , firewalls take the purpose of establishing an obstacle between trust and trustless network, and put corresponding safety strategy into practice. In this paper , the computer network security and the techniques of firewalls were mainly discussed, the concept and classification of the firewalls were introduced. It also introduced three kind's of basic implement techniques of the firewalls: Packet filtering , Application Proxy and Monitor model in detail. Finally described the trend of development of the firewalls techniques in Internet briefly.Key words: network security, firewalls, Packet filtering, monitor1. IntroductionNow with the computer network and e-commerce used widely, network security has become an important problem that we must consider and resolve. More and more professions. enterprises and individuals surfer from the security problem in different degree. they are looking for the more reliable safety solution . In the defense system adopted by network security at present, the firewalls stand the very important position.As the key facility that maintains the network security. firewalls take the purpose of establishing an obstacle between trust and trustless network, and put corresponding safety strategy into practice.All the firewalls have the function to filter the IP address. This task checks the IP packet, makes the decision whether to release or to abandon it according to the source address and destination address of the IP. Shown in Fig.I, there is a firewall between two network sections, an UNIX computer is on one side of the firewall, and the other side is a PC client. While the PC client asks a telnet request for the UNIX computer, the client procedure of telnet in the PC produces a TCP packet and passes the packet to the local protocol stack to prepare to send. The protocol stack fills it in one IP packet. then, sends it to UNIX computer through the path defined by the TCP/IP stack of PC. The IP packet can't reach the UNIX computer until it passes the firewall between the PC and the UNIX computer.Fig. I Ip Address FilteringThe application firewall is a very efficient means of network security on Internet,it is installed between the trust and trustless network, can isolate the connection between the trust and trustless network, and doesn't hamper people's access to the trustless network at the same time. It can isolate the connection between the risk area (namely there may be a certain risk on Internet) and the safe area (LAN), and doesn't hamper people's access to the risk area at the same time. Firewall can monitor the traffic flowing in and out from the network to finish the task seemingly impossible;it only allows the safe and checked information to enter into, and meanwhile resists on the data that may bring about the threat to enterprise. As the fault and defect of the security problem becomemore and more general, the invasion to the network not only comes from the super attack means, but also may be from the lower-level mistakes or improper password selections on the configuration. So, the function of the firewalls is preventing the communication that not hoped and authorized passes in and out of the network protected. forcing the companies to strengthen their own network security policy. The general firewalls can achieve the following purposes: First, restraining others from entering the inside network, filtering the unsafe service and illegal user; Second, preventing the invaders from closing to your defense installation; Third,limiting the user to access the special site; Fourth,providing convenience for monitoring the Internet security.2. The classification and implement technology of firewallsAn integrated firewalls system usually consists of screening router and proxy server. The screening router is a multi-port IP router. it check the each coming IP packet according to the group regular to judge whether to transmit it. The screening router gets information from the packet. fot example the protocol number. the IP address and port number that receiving and sending massages. the flag of link even some other IP selections. filtering IP packet. The proxy server are server process in the firewall. it can replace the network user to finish the specific TCP/IP function. A proxy server is naturally a gateway of application layer. a gateway of two networks joined specific network application. Users contact with proxy server by one of the TCP/IP application such as Telnet or FTP. the proxy server ask the users for the name of the remote host. which users want to access. After the users have answered and offered the correct users' identities and authentication information, the proxy server communicates the remote host, act as the relay between two communication sites. The whole course can be totally transparent to users.There are mainly three types in the firewalls: packet filtering. application gateways and state detection.Packet filtering firewall works on the network layer.it can filter the source address. destination address. source port and destination port of TCP/IP data packet. It has advantages such as the higher efficiency.transparent to user. and users might not feel the existence of the packer filtering firewall, unless he is the illegal user and has been refused. The shortcomings are that it can't ensure the security to most services and protocols, unable to distinguish the different users of the same IP address effectively,and it is difficult to be configured, monitored and managed. can't offer enough daily records and warning.The application gateways firewall performs its function on the application layer, it connects with specific middle-joint (firewall) by a client procedure, and then the middle-joint connects with the server actually. Unlike the packet filtering firewall. when using the firewall of this kind. there is no direct connection between the outside networks. so even if the matter has happened in the firewall. the outside networks can't connect with networks protected. The application gateway firewall offers the detailed daily records and auditing function, it improved the security of the network greatly. and provides the possibility to improve the security performance of the existing software too. The application gateways firewall solves the safety problem based on the specific application program. the products based on Proxy will be improved to configure the service in common use and non-standard port. However. so long as the application program needs upgrading. the users based on Proxy will find that they must buy new Proxy server. As a technique of network safety. Firewall combined with proxy server has simple and practical characteristics, can reach a certain security request in case of not revising the original network application system. However. if the firewall system is broken through. the network protected is in having no state of protecting. Andif an enterprise hopes to launch the business activity on Internet and carry on communication with numerous customers. it can't meet the demands. In addition, the firewall based on Proxy Service will often makes the performance of the network obviously drop.The third generation of firewall takes the detection technique of state as the core, combines the packet filtering firewall and application gateways firewall. The state detection firewall accesses and analyzes the data achieved from the communication layer through the module of state detection to perform its function. The state monitor act as firewall technique. it is best in security perfonnance, it adopts a software engine.which executes the tactics of network security on the gateways, called the detection module. On the premise of not influencing the network to work normally, detection module collects the relevant data to monitor each of the network communication layers, collects a part of data, namely status information, and stores the data up dynamically for the reference in making security decision afterward. Detection modulesupports many kinds of protocols and application program, and can implement the expansion of application and service very easily. Different from other safety schemes, before the user's access reaches the operating system of network gateways, the state monitor should collect the relevant data to analyze, combine network configuration and safety regulation to make the decisions of acceptance, refutation, appraisal or encrypting to the communication etc Once a certain access violates the security regulation, the safety alarm will refuse it and write down to report the state of the network to the system management device. This technology has defects too, namely the configuration of the state monitor is very complicated, and will decelerate the network.3. New generation technique of firewallsAccording to the present firewalls market, the domestic and international manufacturers of firewall can all support the basic function of the firewall well,including access control, the network address transform, proxy, authentication, daily records audit etc. However, as stated before, with the attack to the network increasing, and user's requisition for network security improving day by day, the firewall must get further development. Combine the present experience of research and development and the achievement,some relevant studies point out, according to the development trend of application and technology, how to strengthen the security of firewall, improve the performance of firewall, enrich the function of firewall, will become the problem that the manufacturer of firewalls must face and solve next.The purpose of the new generation firewall is mainly combining the packet filtering and proxy technology, overcoming the defects in the safety respect of two; being able to exert the omnidirectional control from the layer of data chain to the application layer; implementing the micro-kernel of TCP/IP protocol to perform all the security control on the layer of TCP/IP protocol; based on the micro-kernel above, making the speed to exceed thetraditional packet filtering firewall; Offering the transparent mode of proxy. lightening the configuration work on the client; Supporting the data encryption and decryption (DES and RSA ), offering the strong support to the Virtual Private Network VPN; hiding the Inside information totally; producing a new firewall theory.The new techniqe of firewalls has not only covered all the functions of traditional packet filtering firewalls, but also has remarkable advantages in opposing overall the attack means of IP deception, SYN Flood, ICMP. ARP, etc. strengthening proxy service, merging it with packet filtering, then adding the intelligence filtering technology to make the security of the firewall rising to another height.4. ConclusionNow the firewall has already been widely used on Internet, and because of its characteristic of not limited to the TCP/IP protocol, it has more vitality outside Internet progressively too. To be subjective, the firewall is not the omnipotent prescription of solving the problem of network security, but only a component of the network security policy and tactics. However, understanding the technology of firewall and learning to use it in actual operation, believing that every net friend may be benefited a lot from the network life in the new century.外文资料翻译译文摘要:作为关键设施,维护网络的安全性,防火墙采取建立信任与不可靠的网络障碍的目的,并落实相应的安全策略。