Home  >  Article  >  What are the technologies for system security?

What are the technologies for system security?

(*-*)浩
(*-*)浩Original
2019-10-25 15:28:2821004browse

Information security emphasizes the security attributes of the information itself, which mainly includes:

What are the technologies for system security?

The confidentiality of the information, and the information will not be leaked to unauthorized persons Characteristics of the reader;

The integrity of the information, the characteristics of protecting the correctness, completeness and non-tampering of the information; (Recommended learning: web front-end video tutorial)

The characteristics of the information Availability, the characteristic that information can be accessed by authorized users and run as required.

Information cannot exist independently from the carrier. From the perspective of information systems, information security mainly includes four levels: equipment security, data security, content security and behavioral security.

The main technologies to ensure information security are as follows

1. Firewall technology

Firewalls are built on the boundaries of internal and external networks Filtering mechanism, the internal network is considered safe and trustworthy while the external network is considered insecure and untrustworthy. Firewalls monitor traffic in and out of the network, letting in only safe, approved information while blocking data that poses a threat to the business. The main implementation technologies of firewalls include: packet filtering, application gateway and proxy services, etc.

2. Information encryption technology

The purpose of information encryption is to protect data, files, passwords and control information within the network, and to protect data transmitted over the Internet. Data encryption technology is mainly divided into data storage encryption and data transmission encryption. Data transmission encryption mainly encrypts the data stream during transmission. Encryption is an active security defense strategy that can provide considerable security protection for information at a small cost. It is a technology that limits access to data transmitted on the network.

3. Identity authentication technology

Identity authentication is the process of the system verifying the user's identity certificate. Its essence is to find out whether the user has the right to use the resources it requests. Identification is the process by which users present proof of their identity to the system. Identity authentication should include at least a verification protocol and an authorization protocol. Current identity authentication technology, in addition to traditional static password authentication technology, also includes dynamic password authentication technology, IC card technology, digital certificates, fingerprint recognition authentication technology, etc.

4. Security protocol

The establishment and improvement of security protocols are the basic factors for the security and confidentiality system to embark on the path of standardization and standardization.

A relatively complete intranet and security system must at least implement encryption mechanism, verification mechanism and protection mechanism. Currently used security protocols include encryption protocols, key management protocols, data verification protocols, and security audit protocols.

5. Intrusion detection system

The intrusion detection system is a dedicated system for real-time monitoring of network activities. The system is behind the firewall and can work with firewalls and routers to check all communications on a LAN segment, record and ban network activities, and can be reconfigured to ban malicious activities entering from outside the firewall. The intrusion detection system can quickly analyze information on the network or audit and analyze users on the host, and manage and detect through a centralized console.

The above is the detailed content of What are the technologies for system security?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn