The detection and operation units should carry out the "three gates and three monitoring" of network security, that is, the detection and closed-loop management of the three key nodes of system launch, maintenance and vulnerability repair, to prevent and control the introduction of network security risks.
Network security means that the hardware, software and data in the network system are protected from damage, alteration or leakage due to accidental or malicious reasons, and that the system remains continuous Reliable and normal operation without interruption of network services. (Recommended Learning: PHPSTORM )
## Internet Security, usually refers to the security of the computer network, in fact, it can also refer to the security of the computer communication network. Computer communication network is a system that interconnects several computers with independent functions through communication equipment and transmission media, and with the support of communication software, realizes the transmission and exchange of information between computers. The computer network refers to the use of communication means to connect several independent computer systems, terminal equipment and data equipment that are relatively scattered geographically for the purpose of sharing resources, and to exchange data under the control of protocols. system. The fundamental purpose of computer networks is resource sharing. Communication networks are the way to realize network resource sharing. Therefore, computer networks are safe, and the corresponding computer communication networks must also be safe and should be able to achieve this for network users. Information exchange and resource sharing. In the following, network security refers to both computer network security and computer communication network security.The basic meaning of safety:
There is no objective threat and no subjective fear. That is, the object does not worry about its normal state being affected.Network security can be defined as:
A network system is free from any threats and infringements and can normally realize resource sharing functions. In order for the network to realize the resource sharing function normally, we must first ensure that the network hardware and software can operate normally, and then ensure the security of data information exchange. As you can see from the previous two sections, the abuse of resource sharing has led to network security problems. Therefore, the technical approach to network security is to implement restricted sharing.The above is the detailed content of What are the three gates and three monitoring of network security?. For more information, please follow other related articles on the PHP Chinese website!