Joke Collection Website - Public benefit messages - What is the threat of network information security?
What is the threat of network information security?
(1) Information leakage: information is leaked or disclosed to an unauthorized entity.
(2) Destruction of information integrity: data is added, deleted, modified or destroyed without authorization and suffers losses.
(3) Denial of service: Legal access to information or other resources is unconditionally blocked.
(4) Illegal use (unauthorized access): Resources are used by unauthorized persons or in an unauthorized way.
(5) Eavesdropping: stealing information resources and sensitive information in the system by all possible legal or illegal means. For example, for communication.
Wired monitoring of signals transmitted in the line, or interception of useful information by using electromagnetic leakage generated by communication equipment during work.
Wait a minute.
(6) Traffic analysis: Through long-term monitoring of the system, the communication frequency and communication letters are analyzed by statistical analysis.
Information flow direction, total traffic changes and other parameters are studied, from which valuable information and laws are found.
(7) Impersonation: By deceiving communication systems (or users), illegal users can impersonate legitimate users or use them with little privilege.
The purpose of pretending to be a privileged user. Most hackers use fake attacks.
(8) Bypass control: The attacker takes advantage of the security flaws or loopholes in the system to gain unauthorized rights or privileges.
That's right.
For example, the attacker found some system "features" that should be kept secret, but they were exposed. Using these "features", attackers can bypass the defenders of the defense line and invade the inside of the system.
(9) Authorized infringement: The person who is authorized to use the system or resources for a certain purpose uses the right for other unauthorized purposes.
The purpose of power is also called "internal attack".
(10) Trojan Horse: This software contains an imperceptible harmful program segment, which will destroy users.
Safe. This application is called Trojan Horse.
(1 1) Trap gate: an "organ" set in a system or a component to allow violation of specific data input.
Security policy.
(12) Denial: This is an attack from users, such as denying a message you have published and forging a copy of it.
Party letter, etc.
(13) Replay: To copy and forward the intercepted legal communication data for illegal purposes.
(14) computer virus: a program that can realize the functions of infection and infringement during the operation of a computer system.
(15) Careless personnel: Authorized personnel disclose information to unauthorized personnel for some benefit or due to carelessness.
(16) Media Discarding: Get information from discarded disks or printed storage media.
(17) Physical intrusion: The intruder bypasses the physical control and enters the system.
(18) Theft: Important security items, such as tokens or ID cards, are stolen.
(19) Commercial deception: A pseudo system or system component deceives legitimate users or the system to voluntarily give up sensitive information, and so on.
- Previous article:How do idle fish communicate with sellers?
- Next article:Anti-fraud slogan
- Related articles
- Words of comfort to women.
- Many banks in Zhengzhou have introduced deferred loan repayment policies
- Zhenjiang Provident Fund Withdrawal Quota (Zhenjiang Provident Fund Withdrawal Quota Inquiry)
- Will shopping in JD.COM really be returned?
- Iphone4 SMS and address book problem high score ~
- There are too many WeChat messages, how to delete them.
- Can I return the 30 yuan after the deduction?
- How to report harassing calls (mobile), preferably by SMS.
- When will the admission notice of Guizhou Industrial Vocational and Technical College be issued?
- Because of trust, you can't send text messages.