Home  >  Article  >  What are the contents related to network security?

What are the contents related to network security?

王林
王林Original
2019-10-31 15:54:51144399browse

Network security related contents include: 1. Network attacks; 2. Information security; 3. Anti-repudiation issues; 4. Internal network security prevention; 5. Network anti-virus; 6. Network data backup and disaster recovery, etc. .

What are the contents related to network security?

1. Network attacks

1. Attacks on the network can be roughly divided into two categories: service supply and Non-service attacks. The attack methods can be divided into 8 categories: system intrusion attacks, buffer overflow attacks, deception attacks, denial of service attacks, firewall attacks, virus attacks, Trojan horse attacks and backdoor attacks.

2. Service attack (Application Dependent Attrack) refers to launching an attack on a server that provides certain services for the network, causing a "denial of service" on the server and causing the network to work abnormally. The effects of Denial-of-Service Attrack are manifested in consuming bandwidth, consuming computing resources, crashing systems and applications, etc., causing legitimate users of a certain service to be unable to access services that they have permission to access.

3. Non-service attacks (Application Independent Attrack) do not target a specific application device, but target low-level protocols such as the network layer. This type of attack often exploits vulnerabilities in protocols and operating systems when implementing protocols to achieve the purpose of attack. It is a more subtle and dangerous attack method.

2. Information Security

1. Information security in the network mainly includes two aspects: information storage security and information transmission security.

2. Information storage security refers to how to ensure that information statically stored in networked computers will not be illegally used by unauthorized network users.

3. Information transmission security refers to how to ensure that information is not leaked or attacked during network transmission.

The main threats to information transmission security are: intercepting information, eavesdropping on information, tampering with information, and forging information.

The main technology to ensure information security in network systems is data encryption and decryption.

3. Anti-repudiation issue

Anti-repudiation refers to how to prevent the information source user from later not acknowledging the information he or she has sent, or from the user accepting the information. Later he refused to admit his fault. Methods such as identity authentication, digital signatures, digital envelopes, and third-party confirmation are needed to ensure the legality of network information transmission and prevent the occurrence of repudiation.

4. Internal network security prevention

Internal network security prevention refers to how to prevent users with legitimate identities from intentionally or unintentionally leaking information that is harmful to network and information security. Behavior.

To solve the insecurity factors within the network, we must start from two aspects: on the one hand, monitor the network operating status and user working status at any time through network management software, and monitor the extremely important network resources (hosts, databases, disks, etc.) Record and audit usage status; on the other hand, specify and improve network usage and management systems, and strengthen user training and management.

5. Network anti-virus

Current viruses can be roughly divided into 6 categories: boot viruses, executable file viruses, macro viruses, hybrid viruses, and Trojan viruses and Internet language viruses. Network anti-virus needs to be solved from two aspects: anti-virus technology and user management.

6. Network data backup and disaster recovery

No matter how powerful an enterprise is, it cannot avoid network disasters. Some disasters are considered avoidable (such as management (Operator error and accidental deletion of data), and some are unavoidable disasters, such as unexpected power outages and line damage. Alipay and WeChat also experienced several outages last year. Therefore, network data backup and disaster recovery are extremely important.

In the actual network operating environment, data backup and recovery functions are very important. Although they can be avoided from a preventive perspective, it is impossible to completely guarantee that the system will not go wrong.

The above is the detailed content of What are the contents related to network security?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn