The detection and operation units should carry out the "three gates and three monitoring" of network security, that is, the detection and closed-loop management of the three key nodes of system launch, maintenance and vulnerability repair, to prevent and control the introduction of network security risks.
Network security means that the hardware, software and data in the network system are protected from damage, alteration or leakage due to accidental or malicious reasons, and that the system remains continuous Reliable and normal operation without interruption of network services. (Recommended Learning: PHPSTORM )
## Internet Security, usually refers to the security of the computer network, in fact, it can also refer to the security of the computer communication network. Computer communication network is a system that interconnects several computers with independent functions through communication equipment and transmission media, and with the support of communication software, realizes the transmission and exchange of information between computers. The computer network refers to the use of communication means to connect several independent computer systems, terminal equipment and data equipment that are relatively scattered geographically for the purpose of sharing resources, and to exchange data under the control of protocols. system. The fundamental purpose of computer networks is resource sharing. Communication networks are the way to realize network resource sharing. Therefore, computer networks are safe, and the corresponding computer communication networks must also be safe and should be able to achieve this for network users. Information exchange and resource sharing. In the following, network security refers to both computer network security and computer communication network security.The basic meaning of safety:
There is no objective threat and no subjective fear. That is, the object does not worry about its normal state being affected.Network security can be defined as:
A network system is free from any threats and infringements and can normally realize resource sharing functions. In order for the network to realize the resource sharing function normally, we must first ensure that the network hardware and software can operate normally, and then ensure the security of data information exchange. As you can see from the previous two sections, the abuse of resource sharing has led to network security problems. Therefore, the technical approach to network security is to implement restricted sharing.The above is the detailed content of What are the three gates and three monitoring of network security?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

SublimeText3 English version
Recommended: Win version, supports code prompts!

WebStorm Mac version
Useful JavaScript development tools

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

Zend Studio 13.0.1
Powerful PHP integrated development environment