目录0引言..................................................................................................................................................................51计算机网络安全的现状...................................................................................................................................52计算机网络主要隐患.......................................................................................................................................52.1环境灾害..............................................................................................................................................62.2黑客的威胁与攻击..............................................................................................................................62.3计算机病毒..........................................................................................................................................72.4垃圾邮件和间谍软件..........................................................................................................................72.5计算机犯罪..........................................................................................................................................83计算机网络中的安全缺陷及产生的原因........................................................................................................93.1TCP/TP的脆弱性.................................................................................................................................83.2网络结构的缺陷...................................................................................................................................93.3缺乏安全意识.....................................................................................................................................104网络攻击和入侵的主要途径..........................................................................................................................104.1口令入侵............................................................................................................................................104.2IP欺骗...............................................................................................................................................104.3DNS欺骗.............................................................................................................................................115计算机网络安全的防范策略..........................................................................................................................115.1防火墙技术........................................................................................................................................115.2数据加密技术....................................................................................................................................115.3用户授权访问控制技术....................................................................................................................125.4入侵检测技术.....................................................................................................................................135.5防病毒技术.........................................................................................................................................14结论..............