当前位置:网站首页>[technology development-26]: data security of new information and communication networks
[technology development-26]: data security of new information and communication networks
2022-07-05 01:58:00 【Silicon based workshop of slow fire rock sugar】
Preface :
Network security , Usually refers to computer network The safety of the , In fact, it can also refer to computer Communication network The safety of the . Computer communication network is the interconnection of several computers with independent functions through communication equipment and transmission media , With the support of communication software , A system that realizes information transmission and exchange between computers . Computer network refers to Shared resources For the purpose , utilize Means of communication Put several independent computer systems that are relatively scattered in the region 、 The terminal equipment is connected with the data equipment , And exchange data under the control of the protocol . The fundamental purpose of computer network is resource sharing , Communication network is the way to realize network resource sharing , therefore , Computer networks are secure , The corresponding computer communication network must also be secure , It should be able to realize... For network users Information switching And Resource sharing . Below , Network security refers to computer network security , Also refers to computer communication network security .
The basic meaning of safety : Objectively, there is no threat , Subjectively, there is no fear . That is, the object is not worried about its normal state being affected . Network security can be defined as : A network system is free from any threat and infringement , It can normally realize the function of resource sharing . To make the network realize the function of resource sharing normally , First of all, we must ensure the hardware of the network 、 The software can run normally , Then we should ensure the security of data information exchange . You can see from the previous two sections , Due to the abuse of resource sharing , It leads to network security problems . Therefore, the technical way of network security is to implement limited sharing .
Definition of data security , By taking necessary measures , Make sure data In a state of effective protection and legal utilization , And the ability to maintain a state of continued security . Data security is the whole process security of data processing , Data processing , Including data collection 、 Storage 、 Use 、 machining 、 transmission 、 Provide 、 Open, etc .
Information security or data security have opposite meanings : One is the security of the data itself , Mainly refers to the adoption of modern cryptographic algorithm Actively protect data , Such as data confidentiality 、 Data integrity 、 Bidirectional strong Identity Authentication etc. , Data security is an active protection measure , The security of data itself must be based on reliable encryption algorithm and security system , There are mainly Symmetric algorithm And Public key cryptosystem Two kinds of . The second is the security of data protection , It mainly adopts modern information storage means to actively protect data , For example, through the disk array 、 The data backup 、 Disaster tolerance in other places And other means to ensure the security of data ,
Security of data processing It refers to how to effectively prevent data from entering 、 Handle 、 Due to hardware failure in statistics or printing 、 power failure 、 crash 、 Human misoperation 、 Procedural defects 、 Database damage or data loss caused by viruses or hackers , Some sensitive or confidential data may not be read by qualified personnel or operators , And cause data leakage and other consequences .
Data storage security It refers to the readability of the database beyond the operation of the system . Once the database is stolen , Even without the original system program , You can also write another program to view or modify the stolen database . From this point of view , An unencrypted database is not secure , Easy to cause commercial leakage , Therefore, the concept of data leakage prevention is derived , This involves Computer network communication Confidentiality of 、 Safety and software protection Other questions .
边栏推荐
- 流批一体在京东的探索与实践
- Three properties that a good homomorphic encryption should satisfy
- How to build a technical team that will bring down the company?
- Include rake tasks in Gems - including rake tasks in gems
- 【附源码】基于知识图谱的智能推荐系统-Sylvie小兔
- Application and development trend of image recognition technology
- Action News
- Wechat applet: the latest WordPress black gold wallpaper wechat applet two open repair version source code download support traffic main revenue
- 官宣!第三届云原生编程挑战赛正式启动!
- 【LeetCode】88. Merge two ordered arrays
猜你喜欢
Nebula importer data import practice
Incremental backup? db full
A label colorful navigation bar
Stored procedure and stored function in Oracle
runc hang 导致 Kubernetes 节点 NotReady
Win:使用 Shadow Mode 查看远程用户的桌面会话
Blue Bridge Cup Square filling (DFS backtracking)
官宣!第三届云原生编程挑战赛正式启动!
PHP wechat official account development
R语言用logistic逻辑回归和AFRIMA、ARIMA时间序列模型预测世界人口
随机推荐
【LeetCode】88. Merge two ordered arrays
Database postragesq BSD authentication
One plus six brushes into Kali nethunter
STL container
Data guard -- theoretical explanation (III)
[CTF] AWDP summary (WEB)
Database postragesq peer authentication
After reading the average code written by Microsoft God, I realized that I was still too young
Include rake tasks in Gems - including rake tasks in gems
Interesting practice of robot programming 15- autoavoidobstacles
[Digital IC hand tearing code] Verilog edge detection circuit (rising edge, falling edge, double edge) | topic | principle | design | simulation
Numpy library introductory tutorial: basic knowledge summary
One plus six brushes into Kali nethunter
官宣!第三届云原生编程挑战赛正式启动!
How to build a technical team that will bring down the company?
Grub 2.12 will be released this year to continue to improve boot security
PHP wechat official account development
Using openpyxl module to write the binary list into excel file
PHP Joseph Ring problem
Mysql database | build master-slave instances of mysql-8.0 or above based on docker