Joke Collection Website - Bulletin headlines - The content of the network security handwritten report is short
The content of the network security handwritten report is short
Network security knowledge: the nature of the network
Network security knowledge: the nature of the network: Computer networks did not appear with the emergence of computers, but with the society's demand for resources. Developed out of the urgent need for sharing, information exchange and timely delivery. It is the product of the close combination of modern computer technology and communication technology. To be more precise, a computer network is a system that uses communication equipment and communication lines to connect computers and other equipment that are not together, and uses corresponding software to realize resource sharing and information exchange.
The early network only meant that several computers in a unit were connected together with a cable to achieve local resource sharing and information exchange. Today's network connects tens of millions of computers in hundreds of countries in the world, forming a giant spider-web-like "monster" to realize all-round resource sharing around the world. and information exchange. This is the Internet, also known as the International Internet. For an organization, as long as you connect the external connection of the organization's network to the Internet, the nature of your network will fundamentally change, and its extension and connotation will undergo fundamental changes. The network we are talking about today refers to the Internet, and the "online" thing is also the Internet. What are the benefits of network security knowledge?
What are the benefits of network security knowledge: This benefit is actually reflected in the two aspects of resource sharing and information exchange and timely delivery. Take resource sharing as an example. An office or several offices only installs one printer without delaying work; a company or library only purchases an expensive piece of software, and everyone in the company can use it at will; a train Stations or airline ticket offices collect ticket information and put it online. Anyone can check it online at any time to know how many tickets are available for a certain train or flight. Such things as saving money and reducing duplication of work are all benefits. The benefits of information exchange and timely transmission of information in the network are even greater. Because of the computer network, the People's Daily can send the layout to printing sites all over China and even abroad within a few minutes after finishing printing in Beijing. In this way, you can start printing from the newspaper at around 6 o'clock in the morning. The Internet knows the news that happened half an hour before the newspaper was printed; also because of the Internet, farmers in Huadu can sell flowers to countries all over the world from their homes. Children in Shaoguan can attend the online school of the High School Affiliated to Guangzhou Normal University while sitting at home and receive extracurricular tutoring from special teachers across the country. It can be said that it is precisely because long-distance information exchange and timely transmission can be carried out through the network. In this sense, the network has changed time and space, the distance between people has become closer, the earth has become smaller, and information has become smaller. Much more.
Basic content of network security
1. Network attacks
1. Attacks on the network can be roughly divided into two categories: service supply and non-service attacks. The attack methods can be divided into 8 categories: system intrusion attacks, buffer overflow attacks, deception attacks, denial of service attacks, firewall attacks, virus attacks, Trojan horse attacks and backdoor attacks.
2. Service attack (Application Dependent Attrack) refers to launching an attack on a server that provides certain services for the network, causing a "denial of service" on the server and causing the network to work abnormally. The effects of Denial-of-Service Attrack are manifested in consuming bandwidth, consuming computing resources, crashing systems and applications, etc., causing legitimate users of a certain service to be unable to access services that they have permission to access.
3. Non-service attacks (Application Independent Attrack) do not target a specific application device, but attack low-level protocols such as the network layer. This type of attack often exploits vulnerabilities in protocols and operating systems when implementing protocols to achieve the purpose of attack. It is a more subtle and dangerous attack method.
2. Information Security
1. Information security in the network mainly includes two aspects: information storage security and information transmission security.
2. Information storage security refers to how to ensure that information statically stored in networked computers will not be illegally used by unauthorized network users.
3. Information transmission security refers to how to ensure that information is not leaked or attacked during network transmission.
The main threats to information transmission security are: interception of information, tampering with information and forgery of information.
The main technology to ensure information security in network systems is data encryption and decryption.
- Previous article:Quotes about technology
- Next article:What problems should I pay attention to when choosing a wedding banquet hotel?
- Related articles
- A Brief Introduction to the Thanksgiving Story of Fox Fairy in Lonely Studio
- Military training slogans and inspirational promotional slogans
- Slogan of school saving: Diligence is the treasure for life, and frugality is the cultivation of fertile land for all generations.
- How to greet a Japanese teacher whose family is sick?
- On resilience of toughness
- What kind of wine does Little Muddy Fairy have?
- Four-character idioms with balls
- In the past 9 years, tens of thousands of people have been admitted to the hospital. How aggressive are Yunnan people in eating wild mushrooms?
- What slogans are there to promote patriotic poetry?
- Template format of entry resume: 5 pieces