当前位置:网站首页>[technology development-26]: data security of new information and communication networks
[technology development-26]: data security of new information and communication networks
2022-07-05 01:58:00 【Silicon based workshop of slow fire rock sugar】
Preface :
Network security , Usually refers to computer network The safety of the , In fact, it can also refer to computer Communication network The safety of the . Computer communication network is the interconnection of several computers with independent functions through communication equipment and transmission media , With the support of communication software , A system that realizes information transmission and exchange between computers . Computer network refers to Shared resources For the purpose , utilize Means of communication Put several independent computer systems that are relatively scattered in the region 、 The terminal equipment is connected with the data equipment , And exchange data under the control of the protocol . The fundamental purpose of computer network is resource sharing , Communication network is the way to realize network resource sharing , therefore , Computer networks are secure , The corresponding computer communication network must also be secure , It should be able to realize... For network users Information switching And Resource sharing . Below , Network security refers to computer network security , Also refers to computer communication network security .
The basic meaning of safety : Objectively, there is no threat , Subjectively, there is no fear . That is, the object is not worried about its normal state being affected . Network security can be defined as : A network system is free from any threat and infringement , It can normally realize the function of resource sharing . To make the network realize the function of resource sharing normally , First of all, we must ensure the hardware of the network 、 The software can run normally , Then we should ensure the security of data information exchange . You can see from the previous two sections , Due to the abuse of resource sharing , It leads to network security problems . Therefore, the technical way of network security is to implement limited sharing .
Definition of data security , By taking necessary measures , Make sure data In a state of effective protection and legal utilization , And the ability to maintain a state of continued security . Data security is the whole process security of data processing , Data processing , Including data collection 、 Storage 、 Use 、 machining 、 transmission 、 Provide 、 Open, etc .
Information security or data security have opposite meanings : One is the security of the data itself , Mainly refers to the adoption of modern cryptographic algorithm Actively protect data , Such as data confidentiality 、 Data integrity 、 Bidirectional strong Identity Authentication etc. , Data security is an active protection measure , The security of data itself must be based on reliable encryption algorithm and security system , There are mainly Symmetric algorithm And Public key cryptosystem Two kinds of . The second is the security of data protection , It mainly adopts modern information storage means to actively protect data , For example, through the disk array 、 The data backup 、 Disaster tolerance in other places And other means to ensure the security of data ,
Security of data processing It refers to how to effectively prevent data from entering 、 Handle 、 Due to hardware failure in statistics or printing 、 power failure 、 crash 、 Human misoperation 、 Procedural defects 、 Database damage or data loss caused by viruses or hackers , Some sensitive or confidential data may not be read by qualified personnel or operators , And cause data leakage and other consequences .
Data storage security It refers to the readability of the database beyond the operation of the system . Once the database is stolen , Even without the original system program , You can also write another program to view or modify the stolen database . From this point of view , An unencrypted database is not secure , Easy to cause commercial leakage , Therefore, the concept of data leakage prevention is derived , This involves Computer network communication Confidentiality of 、 Safety and software protection Other questions .
边栏推荐
- Interesting practice of robot programming 15- autoavoidobstacles
- Five ways to query MySQL field comments!
- Include rake tasks in Gems - including rake tasks in gems
- The server time zone value ‘� й ��� ʱ 'is unrecognized or representatives more than one time zone【
- Prometheus monitors the correct posture of redis cluster
- Application and Optimization Practice of redis in vivo push platform
- Process scheduling and termination
- Database postragesq PAM authentication
- 使用druid连接MySQL数据库报类型错误
- Action News
猜你喜欢
Hedhat firewall
力扣剑指offer——二叉树篇
One plus six brushes into Kali nethunter
Tucson will lose more than $400million in the next year
[Digital IC hand tearing code] Verilog edge detection circuit (rising edge, falling edge, double edge) | topic | principle | design | simulation
流批一體在京東的探索與實踐
Stored procedure and stored function in Oracle
The MySQL team development specifications used by various factories are too detailed. It is recommended to collect them!
MATLB | multi micro grid and distributed energy trading
The application and Optimization Practice of redis in vivo push platform is transferred to the end of metadata by
随机推荐
Win: use PowerShell to check the strength of wireless signal
RichView TRVStyle MainRVStyle
ICSI 311 Parser
MySQL regexp: Regular Expression Query
RichView TRVStyle MainRVStyle
Complex, complicated and numerous: illustration of seven types of code coupling
Yyds dry inventory jetpack hit dependency injection framework Getting Started Guide
力扣剑指offer——二叉树篇
How to build a technical team that will bring down the company?
Include rake tasks in Gems - including rake tasks in gems
After reading the average code written by Microsoft God, I realized that I was still too young
Database postragesq role membership
Win:将一般用户添加到 Local Admins 组中
Grpc message sending of vertx
Interesting practice of robot programming 15- autoavoidobstacles
Subject 3 how to turn on the high beam diagram? Is the high beam of section 3 up or down
Hedhat firewall
Wechat applet: exclusive applet version of the whole network, independent wechat community contacts
Nebula importer data import practice
179. Maximum number - sort