当前位置:网站首页>[technology development-26]: data security of new information and communication networks
[technology development-26]: data security of new information and communication networks
2022-07-05 01:58:00 【Silicon based workshop of slow fire rock sugar】
Preface :
Network security , Usually refers to computer network The safety of the , In fact, it can also refer to computer Communication network The safety of the . Computer communication network is the interconnection of several computers with independent functions through communication equipment and transmission media , With the support of communication software , A system that realizes information transmission and exchange between computers . Computer network refers to Shared resources For the purpose , utilize Means of communication Put several independent computer systems that are relatively scattered in the region 、 The terminal equipment is connected with the data equipment , And exchange data under the control of the protocol . The fundamental purpose of computer network is resource sharing , Communication network is the way to realize network resource sharing , therefore , Computer networks are secure , The corresponding computer communication network must also be secure , It should be able to realize... For network users Information switching And Resource sharing . Below , Network security refers to computer network security , Also refers to computer communication network security .
The basic meaning of safety : Objectively, there is no threat , Subjectively, there is no fear . That is, the object is not worried about its normal state being affected . Network security can be defined as : A network system is free from any threat and infringement , It can normally realize the function of resource sharing . To make the network realize the function of resource sharing normally , First of all, we must ensure the hardware of the network 、 The software can run normally , Then we should ensure the security of data information exchange . You can see from the previous two sections , Due to the abuse of resource sharing , It leads to network security problems . Therefore, the technical way of network security is to implement limited sharing .
Definition of data security , By taking necessary measures , Make sure data In a state of effective protection and legal utilization , And the ability to maintain a state of continued security . Data security is the whole process security of data processing , Data processing , Including data collection 、 Storage 、 Use 、 machining 、 transmission 、 Provide 、 Open, etc .
Information security or data security have opposite meanings : One is the security of the data itself , Mainly refers to the adoption of modern cryptographic algorithm Actively protect data , Such as data confidentiality 、 Data integrity 、 Bidirectional strong Identity Authentication etc. , Data security is an active protection measure , The security of data itself must be based on reliable encryption algorithm and security system , There are mainly Symmetric algorithm And Public key cryptosystem Two kinds of . The second is the security of data protection , It mainly adopts modern information storage means to actively protect data , For example, through the disk array 、 The data backup 、 Disaster tolerance in other places And other means to ensure the security of data ,
Security of data processing It refers to how to effectively prevent data from entering 、 Handle 、 Due to hardware failure in statistics or printing 、 power failure 、 crash 、 Human misoperation 、 Procedural defects 、 Database damage or data loss caused by viruses or hackers , Some sensitive or confidential data may not be read by qualified personnel or operators , And cause data leakage and other consequences .
Data storage security It refers to the readability of the database beyond the operation of the system . Once the database is stolen , Even without the original system program , You can also write another program to view or modify the stolen database . From this point of view , An unencrypted database is not secure , Easy to cause commercial leakage , Therefore, the concept of data leakage prevention is derived , This involves Computer network communication Confidentiality of 、 Safety and software protection Other questions .
边栏推荐
- Wechat applet: wechat applet source code download new community system optimized version support agent member system function super high income
- RichView TRVStyle MainRVStyle
- Es uses collapsebuilder to de duplicate and return only a certain field
- Database postragesq PAM authentication
- A label colorful navigation bar
- C语音常用的位运算技巧
- Interesting practice of robot programming 14 robot 3D simulation (gazebo+turtlebot3)
- MATLB | multi micro grid and distributed energy trading
- R language uses logistic regression and afrima, ARIMA time series models to predict world population
- Educational Codeforces Round 122 (Rated for Div. 2) ABC
猜你喜欢
After reading the average code written by Microsoft God, I realized that I was still too young
Great God developed the new H5 version of arXiv, saying goodbye to formula typography errors in one step, and mobile phones can also easily read literature
Yyds dry inventory jetpack hit dependency injection framework Getting Started Guide
Prometheus monitors the correct posture of redis cluster
How to safely eat apples on the edge of a cliff? Deepmind & openai gives the answer of 3D security reinforcement learning
Wechat applet: Xingxiu UI v1.5 WordPress system information resources blog download applet wechat QQ dual end source code support WordPress secondary classification loading animation optimization
Stored procedure and stored function in Oracle
增量备份 ?db full
【附源码】基于知识图谱的智能推荐系统-Sylvie小兔
Restful fast request 2022.2.1 release, support curl import
随机推荐
Grpc message sending of vertx
A tab Sina navigation bar
pytorch fine-tuning (funtune) : 镂空设计or 偷梁换柱
Interesting practice of robot programming 14 robot 3D simulation (gazebo+turtlebot3)
Binary tree traversal - middle order traversal (golang)
Runc hang causes the kubernetes node notready
DOM basic syntax
RichView TRVUnits 图像显示单位
Matrixone 0.2.0 is released, and the fastest SQL computing engine is coming
MySQL backup and recovery + experiment
Yyds dry inventory jetpack hit dependency injection framework Getting Started Guide
RichView TRVStyle MainRVStyle
增量备份 ?db full
. Net starts again happy 20th birthday
ICSI 311 Parser
Win:使用 PowerShell 检查无线信号的强弱
如何做一个炫酷的墨水屏电子钟?
The perfect car for successful people: BMW X7! Superior performance, excellent comfort and safety
Flutter 2.10 update details
One click generation and conversion of markdown directory to word format