Joke Collection Website - News headlines - Selected manuscripts of network security

Selected manuscripts of network security

Basic content of network security

First, cyber attacks.

1. Attacks on the network can be roughly divided into two categories: service supply and non-service attacks. Attacks can be divided into eight categories: system intrusion attack, buffer overflow attack, deception attack, denial of service attack, firewall attack, virus attack, Trojan horse attack and backdoor attack.

2. Application Dependent Attrack refers to an attack on a server that provides a certain service for the network, resulting in "denial of service" of the server and abnormal network work. At track's denial-of-service attack has the following effects: consuming bandwidth, consuming computing resources, and crashing systems and applications. , which prevents legitimate users of a service from accessing the services they have access to.

3. Application-independent Attrack is not aimed at specific application devices, but at the underlying protocols such as the network layer. This kind of attack often uses the loopholes in the protocol and operating system to achieve the purpose of the attack, which is a more hidden and dangerous attack means.

Second, information security.

Information security in 1. network mainly includes two aspects: information storage security and information transmission security.

2. Information storage security refers to how to ensure that information statically stored in networked computers will not be illegally used by unauthorized network users.

3. Information transmission security refers to how to ensure that information is not leaked and attacked during network transmission.

The main threats to information transmission security are: intercepting information, tampering with information and forging information.

The main technologies to ensure the information security of network system are data encryption and decryption.

Third, the problem of preventing denial.

Rejection prevention refers to how to prevent users of information sources from not acknowledging the information they sent afterwards, or not acknowledging the account after receiving the information. Authentication, digital signature, digital envelope and third-party confirmation are needed to ensure the legality of network information transmission and prevent denial.

Fourth, the internal security of the network

We sometimes hear the news that a company's customer information was leaked, and it was found that it was caused by a retired employee of the company's background theft. Security protection within the network refers to how to prevent users with legal status from intentionally or unintentionally revealing behaviors harmful to network and information security. To solve the unsafe factors in the network, we must start from two aspects: on the one hand, we can monitor the running state of the network and the working state of users at any time through network management software, and record and audit the use state of extremely important network resources (hosts, databases, disks, etc.). ); On the other hand, it is to standardize and improve the network use and management system and strengthen user training and management.

The essence of network security knowledge

The essence of the network of network security knowledge: computer network does not appear with the appearance of computers, but develops with the urgent need of society for the enjoyment of resources and the exchange and timely transmission of information. It is the product of the close combination of modern computer technology and communication technology. More precisely, a computer network is a system that connects computers and other devices that are not together by using communication equipment and communication lines, and realizes resource sharing and information exchange by using corresponding software.

The early network only means that several computers in a unit are connected by a cable to realize local resource sharing and information exchange. Today's network connects tens of millions of computers in hundreds of countries around the world, forming a "giant" like a spider's web, realizing all-round resource sharing and information exchange around the world. This is the Internet, also known as the Internet. For a company, as long as you connect the external connection of the company network to the Internet, the nature of your network will change fundamentally, and its extension and connotation will also change fundamentally. The network we are talking about today refers to the Internet, and the Internet is also on the Internet.

What are the benefits of network security knowledge?

What are the benefits of a network with knowledge of network security? This benefit is actually reflected in the enjoyment of resources and the exchange and timely transmission of information. Taking the enjoyment of resources as an example, only one printer is installed in one office or several offices without delaying work; A company or library only buys an expensive software, and everyone in the company can use it at will; At the train station or airline ticket office, the ticket information is summarized and put on the internet, and anyone can check online at any time to know how many tickets are left for a train or flight. Such a thing, both saving money and reducing duplication of work, is good. Information exchange and timely transmission in the network are more favorable. Thanks to the computer network, People's Daily can send samples to all parts of China and even foreign printing points within a few minutes after printing in Beijing. In this way, you will know the news that happened half an hour before the newspaper was printed at 6 o'clock in the morning. It is also because of the Internet that farmers in Huadu can sell flowers to all countries in the world at home.