目 录

第1章 网络信息安全概述...............................................................................1

1.1 网络信息安全简介 .............................................................................1

1.1.1 网络信息安全的重要性 .........................................................1

1.1.2 网络信息安全的现状 .............................................................2

1.1.3 网络信息安全的定义 .............................................................3

1.1.4 网络信息安全的主要威胁类型 .............................................4

1.1.5 影响网络信息安全的主要因素 .............................................5

1.2 网络信息安全涉及的内容 .................................................................6

1.2.1 物理和环境安全 .....................................................................7

1.2.2 网络和通信安全 .....................................................................7

1.2.3 设备和计算安全 .....................................................................7

1.2.4 应用和数据安全 .....................................................................8

1.2.5 管理安全 .................................................................................8

1.3 网络信息安全防护 .............................................................................9

1.3.1 PDRR模型 ..............................................................................9

1.3.2 安全策略设计原则 .................................................................9

1.3.3 网络信息安全保障技术 .......................................................11

1.4 网络信息安全标准 ...........................................................................12

1.4.1 美国的TCSEC准则 .............................................................12

1.4.2 我国的安全标准 ...................................................................13

1.5 网络安全等级保护 ...........................................................................14

1.6 网络信息安全法律法规 ...................................................................15

1.6.1 《中华人民共和国网络安全法》相关规定 .......................15

1.6.2 《中华人民共和国刑法》相关规定 ...................................17

1.6.3 《中华人民共和国计算机信息系统安全保护条例》
相关规定 ...............................................................................17

1.6.4 《计算机信息网络国际联网安全保护管理办法》
相关规定 ...............................................................................17

1.6.5 其他相关法律法规 ...............................................................18

1.7 网络信息安全相关从业道德 ...........................................................18

1.8 本章实训 ...........................................................................................18



1.8.1 任务1:系统安全“傻事清单” ..................................................................18

1.8.2 任务2:网络信息安全实训平台的搭建 ......................................................22

1.9 习题 ..............................................................................................................................29

第2章 Windows系统安全 .......................................................................................................31

2.1 操作系统安全的概念 ..................................................................................................31

2.2 服务与端口 ..................................................................................................................32

2.3 组策略 ..........................................................................................................................34

2.4 账户与密码安全 ..........................................................................................................35

2.5 漏洞与后门 ..................................................................................................................35

2.6 本章实训 ......................................................................................................................37

2.6.1 任务1:账户安全配置 ..................................................................................37

2.6.2 任务2:密码安全配置 ..................................................................................41

2.6.3 任务3:系统安全配置 ..................................................................................44

2.6.4 任务4:服务安全配置 ..................................................................................48

2.6.5 任务5:禁用注册表编辑器 ..........................................................................56

2.7 习题 ..............................................................................................................................57

第3章 网络协议与分析............................................................................................................59

3.1 计算机网络体系结构 ..................................................................................................59

3.1.1 OSI参考模型 ...................................................................................................59

3.1.2 TCP/IP参考模型 .............................................................................................61

3.2 MAC地址和以太网的帧格式 ....................................................................................62

3.2.1 MAC地址 ........................................................................................................62

3.2.2 以太网的帧格式 ..............................................................................................63

3.3 网络层协议格式 ..........................................................................................................63

3.3.1 IP格式 ..............................................................................................................63

3.3.2 ARP格式 ..........................................................................................................65

3.3.3 ICMP格式 .......................................................................................................66

3.4 传输层协议格式 ..........................................................................................................67

3.4.1 TCP格式 ..........................................................................................................67

3.4.2 UDP格式 .........................................................................................................68

3.5 三次握手机制 ..............................................................................................................69

3.6 ARP欺骗攻击 ..............................................................................................................69

3.6.1 ARP欺骗攻击的原理 ......................................................................................69

3.6.2 ARP欺骗攻击的防范 ......................................................................................71

3.7 网络监听与端口镜像 ..................................................................................................71

3.7.1 网络监听 ..........................................................................................................71

3.7.2 端口镜像 ..........................................................................................................73



3.8 本章实训 ......................................................................................................................73

3.8.1 任务1:Wireshark软件的安装与使用 ........................................................73

3.8.2 任务2:ARP欺骗攻击与防范 .....................................................................76

3.9 习题 ..............................................................................................................................84

第4章 计算机病毒与木马防护................................................................................................86

4.1 计算机病毒的概念 ......................................................................................................86

4.1.1 计算机病毒的定义 ..........................................................................................86

4.1.2 计算机病毒的产生与发展 ..............................................................................86

4.1.3 计算机病毒发作的症状 ..................................................................................88

4.2 计算机病毒的分类 ......................................................................................................89

4.2.1 按病毒存在的媒体分类 ..................................................................................89

4.2.2 按病毒传染的方法分类 ..................................................................................89

4.2.3 按病毒破坏的能力分类 ..................................................................................90

4.2.4 按病毒链接的方式分类 ..................................................................................90

4.2.5 按病毒激活的时间分类 ..................................................................................90

4.3 计算机病毒的特征 ......................................................................................................90

4.4 计算机病毒的特殊编程技术 ......................................................................................91

4.5 宏病毒和蠕虫病毒 ......................................................................................................91

4.5.1 宏病毒 ..............................................................................................................91

4.5.2 蠕虫病毒 ..........................................................................................................92

4.6 手机病毒 ......................................................................................................................94

4.6.1 手机病毒的传播途径 ......................................................................................94

4.6.2 手机病毒的危害 ..............................................................................................94

4.6.3 常见的手机病毒 ..............................................................................................95

4.6.4 手机病毒的预防 ..............................................................................................95

4.7 木马 ..............................................................................................................................96

4.7.1 服务端和客户端 ..............................................................................................96

4.7.2 木马程序的基本特征 ......................................................................................97

4.7.3 木马程序功能 ..................................................................................................97

4.7.4 木马的分类 ......................................................................................................98

4.7.5 木马的工作过程 ..............................................................................................99

4.8 勒索病毒 ....................................................................................................................100

4.8.1 勒索病毒的概念 ............................................................................................100

4.8.2 勒索病毒的分类 ............................................................................................100

4.9 反病毒技术 ................................................................................................................101

4.9.1 病毒检测原理 ................................................................................................101

4.9.2 反病毒软件 ....................................................................................................102

4.9.3 病毒的预防 ....................................................................................................102



4.10 本章实训 ..................................................................................................................103

4.10.1 任务1:360杀毒软件的使用 ...................................................................103

4.10.2 任务2:360安全卫士软件的使用 ...........................................................106

4.10.3 任务3:制作一个简单的宏病毒 ..............................................................109

4.10.4 任务4:利用自解压文件携带木马程序 ..................................................111

4.10.5 任务5:反弹端口木马(灰鸽子)的演示 ...............................................113

4.11 习题 ...........................................................................................................................116

第5章 密码技术......................................................................................................................119

5.1 密码学的基础知识 ....................................................................................................119

5.1.1 密码学的发展历史 ........................................................................................119

5.1.2 信息的加密和解密 ........................................................................................120

5.2 古典密码技术 ............................................................................................................121

5.2.1 滚筒密码 ........................................................................................................121

5.2.2 掩格密码 ........................................................................................................122

5.2.3 棋盘密码 ........................................................................................................122

5.2.4 恺撒密码 ........................................................................................................122

5.2.5 圆盘密码 ........................................................................................................123

5.2.6 维吉尼亚密码 ................................................................................................123

5.3 对称密码技术 ............................................................................................................124

5.3.1 对称密码技术原理 ........................................................................................124

5.3.2 DES算法 ........................................................................................................125

5.3.3 IDEA算法 ......................................................................................................126

5.3.4 AES算法 ........................................................................................................126

5.4 非对称密码技术 ........................................................................................................127

5.4.1 非对称密码技术原理 ....................................................................................127

5.4.2 RSA算法 .......................................................................................................128

5.4.3 Diffie-Hellman算法 .......................................................................................130

5.5 单向散列算法 ............................................................................................................130

5.6 数字签名技术 ............................................................................................................131

5.6.1 数字签名的基本原理 ....................................................................................131

5.6.2 数字签名的工作过程 ....................................................................................132

5.7 数字证书 ....................................................................................................................133

5.8 加密文件系统 ............................................................................................................134

5.9 密码分析技术 ............................................................................................................134

5.9.1 穷举分析 ........................................................................................................135

5.9.2 根据字母频率分析 ........................................................................................135

5.10 本章实训 ..................................................................................................................136

5.10.1 任务1:DES、RSA和Hash算法的实现 ..............................................136



5.10.2 任务2:PGP软件的使用 .........................................................................141

5.10.3 任务3:Windows 10加密文件系统的应用 ...........................................147

5.11 习题 ...........................................................................................................................151

第6章 网络攻击与防范..........................................................................................................155

6.1 网络攻防概述 ............................................................................................................155

6.1.1 黑客概述 ........................................................................................................155

6.1.2 网络攻击的步骤 ............................................................................................156

6.1.3 网络攻击的防范策略 ....................................................................................157

6.2 目标系统的探测 ........................................................................................................158

6.2.1 常用DOS命令 ..............................................................................................158

6.2.2 扫描器 ............................................................................................................160

6.3 网络监听 ....................................................................................................................162

6.4 口令破解 ....................................................................................................................163

6.4.1 口令破解概述 ................................................................................................163

6.4.2 SMBCrack口令破解工具简介 .....................................................................163

6.4.3 口令破解的防范 ............................................................................................164

6.5 IPC$入侵 ...................................................................................................................164

6.5.1 IPC$概述 .......................................................................................................164

6.5.2 IPC$入侵方法 ...............................................................................................165

6.5.3 IPC$入侵的防范 ...........................................................................................166

6.6 缓冲区溢出攻击 ........................................................................................................166

6.6.1 缓冲区溢出原理 ............................................................................................166

6.6.2 缓冲区溢出攻击的防范 ................................................................................167

6.7 拒绝服务攻击 ............................................................................................................167

6.7.1 拒绝服务攻击的定义 ....................................................................................167

6.7.2 拒绝服务攻击的目的 ....................................................................................167

6.7.3 拒绝服务攻击的原理 ....................................................................................168

6.7.4 常见拒绝服务攻击类型及防范方法 ............................................................168

6.8 分布式拒绝服务攻击 ................................................................................................170

6.8.1 分布式拒绝服务攻击的原理 ........................................................................170

6.8.2 分布式拒绝服务攻击的防范 ........................................................................170

6.9 分布式反射型拒绝服务攻击 ....................................................................................171

6.9.1 分布式反射型拒绝服务的攻击原理及特点 ................................................171

6.9.2 常见分布式反射型拒绝服务攻击的类型 ....................................................172

6.9.3 分布式反射型拒绝服务攻击的防范 ............................................................173

6.10 蜜罐技术 ..................................................................................................................174

6.10.1 蜜罐的定义 ................................................................................................174

6.10.2 蜜罐的功能与特点 ....................................................................................174



6.10.3 蜜罐的分类 ................................................................................................175

6.11 本章实训 ...................................................................................................................176

6.11.1 任务1:黑客入侵的模拟演示 ................................................................176

6.11.2 任务2:拒绝服务攻击的演示 ................................................................181

6.12 习题 ..........................................................................................................................183

第7章 防火墙技术..................................................................................................................185

7.1 防火墙概述 ................................................................................................................185

7.1.1 防火墙的定义 ................................................................................................185

7.1.2 防火墙的功能 ................................................................................................186

7.2 防火墙技术原理 ........................................................................................................187

7.2.1 包过滤防火墙 ................................................................................................187

7.2.2 代理防火墙 ....................................................................................................188

7.2.3 状态检测防火墙 ............................................................................................190

7.3 防火墙体系结构 ........................................................................................................191

7.3.1 包过滤路由器防火墙结构 ............................................................................191

7.3.2 双宿主主机防火墙结构 ................................................................................191

7.3.3 屏蔽主机防火墙结构 ....................................................................................192

7.3.4 屏蔽子网防火墙结构 ....................................................................................192

7.4 Windows防火墙 ........................................................................................................193

7.4.1 网络配置文件 ................................................................................................193

7.4.2 高级安全性 ....................................................................................................194

7.5 Cisco PIX防火墙 .......................................................................................................195

7.5.1 PIX防火墙接口 .............................................................................................195

7.5.2 PIX防火墙管理访问模式 .............................................................................196

7.5.3 PIX防火墙配置方法 .....................................................................................196

7.6 本章实训 ....................................................................................................................200

7.7 习题 ............................................................................................................................212

第8章 入侵检测技术..............................................................................................................214

8.1 入侵检测系统概述 ....................................................................................................214

8.2 入侵检测系统的基本结构 ........................................................................................215

8.3 入侵检测系统的分类 ................................................................................................216

8.3.1 基于主机的入侵检测系统 ............................................................................216

8.3.2 基于网络的入侵检测系统 ............................................................................217

8.3.3 分布式入侵检测系统 ....................................................................................219

8.4 入侵检测技术的分类 ................................................................................................220

8.4.1 误用检测技术 ................................................................................................220

8.4.2 异常检测技术 ................................................................................................221



8.5 入侵防护系统 ............................................................................................................222

8.5.1 入侵防护系统的工作原理 ............................................................................222

8.5.2 入侵防护系统的分类 ....................................................................................222

8.5.3 入侵检测系统和入侵防护系统的关系 ........................................................223

8.6 本章实训 ....................................................................................................................223

8.7 习题 ............................................................................................................................227

第9章 VPN技术 ....................................................................................................................229

9.1 VPN概述....................................................................................................................229

9.2 VPN的特点................................................................................................................230

9.3 VPN的处理过程........................................................................................................230

9.4 VPN的分类................................................................................................................231

9.5 VPN的关键技术........................................................................................................232

9.6 VPN隧道协议............................................................................................................233

9.7 本章实训 ....................................................................................................................234

9.7.1 任务1:在Windows Server 2016上部署VPN服务器 ............................234

9.7.2 任务2:在Windows 10客户端建立并测试VPN连接 ............................240

9.8 习题 ............................................................................................................................244

第10章 Web应用安全 ...........................................................................................................246

10.1 Web应用安全概述 ..................................................................................................246

10.1.1 Web应用安全的重要性 ............................................................................246

10.1.2 Web应用体系架构 ....................................................................................247

10.1.3 Web应用的安全威胁 ................................................................................247

10.2 IIS的安全设置 .........................................................................................................248

10.2.1 IIS安装安全 ..............................................................................................248

10.2.2 用户身份验证 ............................................................................................249

10.2.3 访问权限控制 ............................................................................................250

10.2.4 IP地址控制 ................................................................................................250

10.2.5 端口安全 ....................................................................................................250

10.2.6 SSL安全 ....................................................................................................251

10.3 SQL注入 ..................................................................................................................251

10.4 XSS跨站脚本 ..........................................................................................................253

10.4.1 XSS简介 ....................................................................................................253

10.4.2 XSS的分类 ................................................................................................253

10.5 Web传输的安全 ......................................................................................................255

10.6 Web浏览器的安全 ..................................................................................................255

10.6.1 Cookie及安全设置 ....................................................................................256

10.6.2 ActiveX及安全设置 ..................................................................................256



10.6.3 Java语言及安全设置 ................................................................................259

10.7 网络钓鱼 ..................................................................................................................260

10.7.1 网络钓鱼概述 ............................................................................................260

10.7.2 网络钓鱼的防范 ........................................................................................260

10.8 本章实训 ..................................................................................................................261

10.8.1 任务1:Web服务器的安全配置 ............................................................261

10.8.2 任务2:利用SQL注入漏洞实现网站入侵的演示 ..............................267

10.8.3 任务3:通过SSL访问Web服务器 ......................................................268

10.9 习题 ..........................................................................................................................279

第11章 无线网络安全 ............................................................................................................281

11.1 无线局域网基础 .......................................................................................................281

11.2 无线局域网标准 .......................................................................................................282

11.2.1 IEEE 802.11x系列标准 .............................................................................282

11.2.2 家庭无线网络技术.....................................................................................284

11.2.3 蓝牙技术.....................................................................................................284

11.3 无线局域网接入设备 ...............................................................................................285

11.3.1 无线网卡.....................................................................................................285

11.3.2 无线访问接入点.........................................................................................285

11.3.3 无线路由器.................................................................................................286

11.3.4 天线.............................................................................................................286

11.4 无线局域网的组网模式 ...........................................................................................287

11.4.1 Ad-Hoc模式 ...............................................................................................287

11.4.2 Infrastructure模式 ......................................................................................288

11.5 服务集标识SSID .....................................................................................................288

11.6 无线加密标准 ...........................................................................................................288

11.6.1 WEP加密标准 ...........................................................................................288

11.6.2 WPA加密标准 ...........................................................................................289

11.6.3 WPA2加密标准 .........................................................................................289

11.6.4 WPA3加密标准 .........................................................................................289

11.6.5 中国WAPI安全标准 .................................................................................290

11.7 无线局域网常见的攻击 ...........................................................................................290

11.8 提高无线网络安全的方法 .......................................................................................291

11.9 本章实训 ...................................................................................................................293

11.10 习题 .........................................................................................................................299

参考文献.....................................................................................................................................301