目 录 第1章 网络信息安全概述...............................................................................1 1.1 网络信息安全简介 .............................................................................1 1.1.1 网络信息安全的重要性 .........................................................1 1.1.2 网络信息安全的现状 .............................................................2 1.1.3 网络信息安全的定义 .............................................................3 1.1.4 网络信息安全的主要威胁类型 .............................................4 1.1.5 影响网络信息安全的主要因素 .............................................5 1.2 网络信息安全涉及的内容 .................................................................6 1.2.1 物理和环境安全 .....................................................................7 1.2.2 网络和通信安全 .....................................................................7 1.2.3 设备和计算安全 .....................................................................7 1.2.4 应用和数据安全 .....................................................................8 1.2.5 管理安全 .................................................................................8 1.3 网络信息安全防护 .............................................................................9 1.3.1 PDRR模型 ..............................................................................9 1.3.2 安全策略设计原则 .................................................................9 1.3.3 网络信息安全保障技术 .......................................................11 1.4 网络信息安全标准 ...........................................................................12 1.4.1 美国的TCSEC准则 .............................................................12 1.4.2 我国的安全标准 ...................................................................13 1.5 网络安全等级保护 ...........................................................................14 1.6 网络信息安全法律法规 ...................................................................15 1.6.1 《中华人民共和国网络安全法》相关规定 .......................15 1.6.2 《中华人民共和国刑法》相关规定 ...................................17 1.6.3 《中华人民共和国计算机信息系统安全保护条例》 相关规定 ...............................................................................17 1.6.4 《计算机信息网络国际联网安全保护管理办法》 相关规定 ...............................................................................17 1.6.5 其他相关法律法规 ...............................................................18 1.7 网络信息安全相关从业道德 ...........................................................18 1.8 本章实训 ...........................................................................................18 1.8.1 任务1:系统安全“傻事清单” ..................................................................18 1.8.2 任务2:网络信息安全实训平台的搭建 ......................................................22 1.9 习题 ..............................................................................................................................29 第2章 Windows系统安全 .......................................................................................................31 2.1 操作系统安全的概念 ..................................................................................................31 2.2 服务与端口 ..................................................................................................................32 2.3 组策略 ..........................................................................................................................34 2.4 账户与密码安全 ..........................................................................................................35 2.5 漏洞与后门 ..................................................................................................................35 2.6 本章实训 ......................................................................................................................37 2.6.1 任务1:账户安全配置 ..................................................................................37 2.6.2 任务2:密码安全配置 ..................................................................................41 2.6.3 任务3:系统安全配置 ..................................................................................44 2.6.4 任务4:服务安全配置 ..................................................................................48 2.6.5 任务5:禁用注册表编辑器 ..........................................................................56 2.7 习题 ..............................................................................................................................57 第3章 网络协议与分析............................................................................................................59 3.1 计算机网络体系结构 ..................................................................................................59 3.1.1 OSI参考模型 ...................................................................................................59 3.1.2 TCP/IP参考模型 .............................................................................................61 3.2 MAC地址和以太网的帧格式 ....................................................................................62 3.2.1 MAC地址 ........................................................................................................62 3.2.2 以太网的帧格式 ..............................................................................................63 3.3 网络层协议格式 ..........................................................................................................63 3.3.1 IP格式 ..............................................................................................................63 3.3.2 ARP格式 ..........................................................................................................65 3.3.3 ICMP格式 .......................................................................................................66 3.4 传输层协议格式 ..........................................................................................................67 3.4.1 TCP格式 ..........................................................................................................67 3.4.2 UDP格式 .........................................................................................................68 3.5 三次握手机制 ..............................................................................................................69 3.6 ARP欺骗攻击 ..............................................................................................................69 3.6.1 ARP欺骗攻击的原理 ......................................................................................69 3.6.2 ARP欺骗攻击的防范 ......................................................................................71 3.7 网络监听与端口镜像 ..................................................................................................71 3.7.1 网络监听 ..........................................................................................................71 3.7.2 端口镜像 ..........................................................................................................73 3.8 本章实训 ......................................................................................................................73 3.8.1 任务1:Wireshark软件的安装与使用 ........................................................73 3.8.2 任务2:ARP欺骗攻击与防范 .....................................................................76 3.9 习题 ..............................................................................................................................84 第4章 计算机病毒与木马防护................................................................................................86 4.1 计算机病毒的概念 ......................................................................................................86 4.1.1 计算机病毒的定义 ..........................................................................................86 4.1.2 计算机病毒的产生与发展 ..............................................................................86 4.1.3 计算机病毒发作的症状 ..................................................................................88 4.2 计算机病毒的分类 ......................................................................................................89 4.2.1 按病毒存在的媒体分类 ..................................................................................89 4.2.2 按病毒传染的方法分类 ..................................................................................89 4.2.3 按病毒破坏的能力分类 ..................................................................................90 4.2.4 按病毒链接的方式分类 ..................................................................................90 4.2.5 按病毒激活的时间分类 ..................................................................................90 4.3 计算机病毒的特征 ......................................................................................................90 4.4 计算机病毒的特殊编程技术 ......................................................................................91 4.5 宏病毒和蠕虫病毒 ......................................................................................................91 4.5.1 宏病毒 ..............................................................................................................91 4.5.2 蠕虫病毒 ..........................................................................................................92 4.6 手机病毒 ......................................................................................................................94 4.6.1 手机病毒的传播途径 ......................................................................................94 4.6.2 手机病毒的危害 ..............................................................................................94 4.6.3 常见的手机病毒 ..............................................................................................95 4.6.4 手机病毒的预防 ..............................................................................................95 4.7 木马 ..............................................................................................................................96 4.7.1 服务端和客户端 ..............................................................................................96 4.7.2 木马程序的基本特征 ......................................................................................97 4.7.3 木马程序功能 ..................................................................................................97 4.7.4 木马的分类 ......................................................................................................98 4.7.5 木马的工作过程 ..............................................................................................99 4.8 勒索病毒 ....................................................................................................................100 4.8.1 勒索病毒的概念 ............................................................................................100 4.8.2 勒索病毒的分类 ............................................................................................100 4.9 反病毒技术 ................................................................................................................101 4.9.1 病毒检测原理 ................................................................................................101 4.9.2 反病毒软件 ....................................................................................................102 4.9.3 病毒的预防 ....................................................................................................102 4.10 本章实训 ..................................................................................................................103 4.10.1 任务1:360杀毒软件的使用 ...................................................................103 4.10.2 任务2:360安全卫士软件的使用 ...........................................................106 4.10.3 任务3:制作一个简单的宏病毒 ..............................................................109 4.10.4 任务4:利用自解压文件携带木马程序 ..................................................111 4.10.5 任务5:反弹端口木马(灰鸽子)的演示 ...............................................113 4.11 习题 ...........................................................................................................................116 第5章 密码技术......................................................................................................................119 5.1 密码学的基础知识 ....................................................................................................119 5.1.1 密码学的发展历史 ........................................................................................119 5.1.2 信息的加密和解密 ........................................................................................120 5.2 古典密码技术 ............................................................................................................121 5.2.1 滚筒密码 ........................................................................................................121 5.2.2 掩格密码 ........................................................................................................122 5.2.3 棋盘密码 ........................................................................................................122 5.2.4 恺撒密码 ........................................................................................................122 5.2.5 圆盘密码 ........................................................................................................123 5.2.6 维吉尼亚密码 ................................................................................................123 5.3 对称密码技术 ............................................................................................................124 5.3.1 对称密码技术原理 ........................................................................................124 5.3.2 DES算法 ........................................................................................................125 5.3.3 IDEA算法 ......................................................................................................126 5.3.4 AES算法 ........................................................................................................126 5.4 非对称密码技术 ........................................................................................................127 5.4.1 非对称密码技术原理 ....................................................................................127 5.4.2 RSA算法 .......................................................................................................128 5.4.3 Diffie-Hellman算法 .......................................................................................130 5.5 单向散列算法 ............................................................................................................130 5.6 数字签名技术 ............................................................................................................131 5.6.1 数字签名的基本原理 ....................................................................................131 5.6.2 数字签名的工作过程 ....................................................................................132 5.7 数字证书 ....................................................................................................................133 5.8 加密文件系统 ............................................................................................................134 5.9 密码分析技术 ............................................................................................................134 5.9.1 穷举分析 ........................................................................................................135 5.9.2 根据字母频率分析 ........................................................................................135 5.10 本章实训 ..................................................................................................................136 5.10.1 任务1:DES、RSA和Hash算法的实现 ..............................................136 5.10.2 任务2:PGP软件的使用 .........................................................................141 5.10.3 任务3:Windows 10加密文件系统的应用 ...........................................147 5.11 习题 ...........................................................................................................................151 第6章 网络攻击与防范..........................................................................................................155 6.1 网络攻防概述 ............................................................................................................155 6.1.1 黑客概述 ........................................................................................................155 6.1.2 网络攻击的步骤 ............................................................................................156 6.1.3 网络攻击的防范策略 ....................................................................................157 6.2 目标系统的探测 ........................................................................................................158 6.2.1 常用DOS命令 ..............................................................................................158 6.2.2 扫描器 ............................................................................................................160 6.3 网络监听 ....................................................................................................................162 6.4 口令破解 ....................................................................................................................163 6.4.1 口令破解概述 ................................................................................................163 6.4.2 SMBCrack口令破解工具简介 .....................................................................163 6.4.3 口令破解的防范 ............................................................................................164 6.5 IPC$入侵 ...................................................................................................................164 6.5.1 IPC$概述 .......................................................................................................164 6.5.2 IPC$入侵方法 ...............................................................................................165 6.5.3 IPC$入侵的防范 ...........................................................................................166 6.6 缓冲区溢出攻击 ........................................................................................................166 6.6.1 缓冲区溢出原理 ............................................................................................166 6.6.2 缓冲区溢出攻击的防范 ................................................................................167 6.7 拒绝服务攻击 ............................................................................................................167 6.7.1 拒绝服务攻击的定义 ....................................................................................167 6.7.2 拒绝服务攻击的目的 ....................................................................................167 6.7.3 拒绝服务攻击的原理 ....................................................................................168 6.7.4 常见拒绝服务攻击类型及防范方法 ............................................................168 6.8 分布式拒绝服务攻击 ................................................................................................170 6.8.1 分布式拒绝服务攻击的原理 ........................................................................170 6.8.2 分布式拒绝服务攻击的防范 ........................................................................170 6.9 分布式反射型拒绝服务攻击 ....................................................................................171 6.9.1 分布式反射型拒绝服务的攻击原理及特点 ................................................171 6.9.2 常见分布式反射型拒绝服务攻击的类型 ....................................................172 6.9.3 分布式反射型拒绝服务攻击的防范 ............................................................173 6.10 蜜罐技术 ..................................................................................................................174 6.10.1 蜜罐的定义 ................................................................................................174 6.10.2 蜜罐的功能与特点 ....................................................................................174 6.10.3 蜜罐的分类 ................................................................................................175 6.11 本章实训 ...................................................................................................................176 6.11.1 任务1:黑客入侵的模拟演示 ................................................................176 6.11.2 任务2:拒绝服务攻击的演示 ................................................................181 6.12 习题 ..........................................................................................................................183 第7章 防火墙技术..................................................................................................................185 7.1 防火墙概述 ................................................................................................................185 7.1.1 防火墙的定义 ................................................................................................185 7.1.2 防火墙的功能 ................................................................................................186 7.2 防火墙技术原理 ........................................................................................................187 7.2.1 包过滤防火墙 ................................................................................................187 7.2.2 代理防火墙 ....................................................................................................188 7.2.3 状态检测防火墙 ............................................................................................190 7.3 防火墙体系结构 ........................................................................................................191 7.3.1 包过滤路由器防火墙结构 ............................................................................191 7.3.2 双宿主主机防火墙结构 ................................................................................191 7.3.3 屏蔽主机防火墙结构 ....................................................................................192 7.3.4 屏蔽子网防火墙结构 ....................................................................................192 7.4 Windows防火墙 ........................................................................................................193 7.4.1 网络配置文件 ................................................................................................193 7.4.2 高级安全性 ....................................................................................................194 7.5 Cisco PIX防火墙 .......................................................................................................195 7.5.1 PIX防火墙接口 .............................................................................................195 7.5.2 PIX防火墙管理访问模式 .............................................................................196 7.5.3 PIX防火墙配置方法 .....................................................................................196 7.6 本章实训 ....................................................................................................................200 7.7 习题 ............................................................................................................................212 第8章 入侵检测技术..............................................................................................................214 8.1 入侵检测系统概述 ....................................................................................................214 8.2 入侵检测系统的基本结构 ........................................................................................215 8.3 入侵检测系统的分类 ................................................................................................216 8.3.1 基于主机的入侵检测系统 ............................................................................216 8.3.2 基于网络的入侵检测系统 ............................................................................217 8.3.3 分布式入侵检测系统 ....................................................................................219 8.4 入侵检测技术的分类 ................................................................................................220 8.4.1 误用检测技术 ................................................................................................220 8.4.2 异常检测技术 ................................................................................................221 8.5 入侵防护系统 ............................................................................................................222 8.5.1 入侵防护系统的工作原理 ............................................................................222 8.5.2 入侵防护系统的分类 ....................................................................................222 8.5.3 入侵检测系统和入侵防护系统的关系 ........................................................223 8.6 本章实训 ....................................................................................................................223 8.7 习题 ............................................................................................................................227 第9章 VPN技术 ....................................................................................................................229 9.1 VPN概述....................................................................................................................229 9.2 VPN的特点................................................................................................................230 9.3 VPN的处理过程........................................................................................................230 9.4 VPN的分类................................................................................................................231 9.5 VPN的关键技术........................................................................................................232 9.6 VPN隧道协议............................................................................................................233 9.7 本章实训 ....................................................................................................................234 9.7.1 任务1:在Windows Server 2016上部署VPN服务器 ............................234 9.7.2 任务2:在Windows 10客户端建立并测试VPN连接 ............................240 9.8 习题 ............................................................................................................................244 第10章 Web应用安全 ...........................................................................................................246 10.1 Web应用安全概述 ..................................................................................................246 10.1.1 Web应用安全的重要性 ............................................................................246 10.1.2 Web应用体系架构 ....................................................................................247 10.1.3 Web应用的安全威胁 ................................................................................247 10.2 IIS的安全设置 .........................................................................................................248 10.2.1 IIS安装安全 ..............................................................................................248 10.2.2 用户身份验证 ............................................................................................249 10.2.3 访问权限控制 ............................................................................................250 10.2.4 IP地址控制 ................................................................................................250 10.2.5 端口安全 ....................................................................................................250 10.2.6 SSL安全 ....................................................................................................251 10.3 SQL注入 ..................................................................................................................251 10.4 XSS跨站脚本 ..........................................................................................................253 10.4.1 XSS简介 ....................................................................................................253 10.4.2 XSS的分类 ................................................................................................253 10.5 Web传输的安全 ......................................................................................................255 10.6 Web浏览器的安全 ..................................................................................................255 10.6.1 Cookie及安全设置 ....................................................................................256 10.6.2 ActiveX及安全设置 ..................................................................................256 10.6.3 Java语言及安全设置 ................................................................................259 10.7 网络钓鱼 ..................................................................................................................260 10.7.1 网络钓鱼概述 ............................................................................................260 10.7.2 网络钓鱼的防范 ........................................................................................260 10.8 本章实训 ..................................................................................................................261 10.8.1 任务1:Web服务器的安全配置 ............................................................261 10.8.2 任务2:利用SQL注入漏洞实现网站入侵的演示 ..............................267 10.8.3 任务3:通过SSL访问Web服务器 ......................................................268 10.9 习题 ..........................................................................................................................279 第11章 无线网络安全 ............................................................................................................281 11.1 无线局域网基础 .......................................................................................................281 11.2 无线局域网标准 .......................................................................................................282 11.2.1 IEEE 802.11x系列标准 .............................................................................282 11.2.2 家庭无线网络技术.....................................................................................284 11.2.3 蓝牙技术.....................................................................................................284 11.3 无线局域网接入设备 ...............................................................................................285 11.3.1 无线网卡.....................................................................................................285 11.3.2 无线访问接入点.........................................................................................285 11.3.3 无线路由器.................................................................................................286 11.3.4 天线.............................................................................................................286 11.4 无线局域网的组网模式 ...........................................................................................287 11.4.1 Ad-Hoc模式 ...............................................................................................287 11.4.2 Infrastructure模式 ......................................................................................288 11.5 服务集标识SSID .....................................................................................................288 11.6 无线加密标准 ...........................................................................................................288 11.6.1 WEP加密标准 ...........................................................................................288 11.6.2 WPA加密标准 ...........................................................................................289 11.6.3 WPA2加密标准 .........................................................................................289 11.6.4 WPA3加密标准 .........................................................................................289 11.6.5 中国WAPI安全标准 .................................................................................290 11.7 无线局域网常见的攻击 ...........................................................................................290 11.8 提高无线网络安全的方法 .......................................................................................291 11.9 本章实训 ...................................................................................................................293 11.10 习题 .........................................................................................................................299 参考文献.....................................................................................................................................301