当前位置:网站首页>[technology development-26]: data security of new information and communication networks

[technology development-26]: data security of new information and communication networks

2022-07-05 01:58:00 Silicon based workshop of slow fire rock sugar

Preface :

Network security , Usually refers to computer network The safety of the , In fact, it can also refer to computer Communication network The safety of the . Computer communication network is the interconnection of several computers with independent functions through communication equipment and transmission media , With the support of communication software , A system that realizes information transmission and exchange between computers . Computer network refers to Shared resources For the purpose , utilize Means of communication Put several independent computer systems that are relatively scattered in the region 、 The terminal equipment is connected with the data equipment , And exchange data under the control of the protocol . The fundamental purpose of computer network is resource sharing , Communication network is the way to realize network resource sharing , therefore , Computer networks are secure , The corresponding computer communication network must also be secure , It should be able to realize... For network users Information switching And Resource sharing . Below , Network security refers to computer network security , Also refers to computer communication network security .

The basic meaning of safety : Objectively, there is no threat , Subjectively, there is no fear . That is, the object is not worried about its normal state being affected . Network security can be defined as : A network system is free from any threat and infringement , It can normally realize the function of resource sharing . To make the network realize the function of resource sharing normally , First of all, we must ensure the hardware of the network 、 The software can run normally , Then we should ensure the security of data information exchange . You can see from the previous two sections , Due to the abuse of resource sharing , It leads to network security problems . Therefore, the technical way of network security is to implement limited sharing .

Definition of data security , By taking necessary measures , Make sure data In a state of effective protection and legal utilization , And the ability to maintain a state of continued security . Data security is the whole process security of data processing , Data processing , Including data collection 、 Storage 、 Use 、 machining 、 transmission 、 Provide 、 Open, etc .

Information security or data security have opposite meanings : One is the security of the data itself , Mainly refers to the adoption of modern cryptographic algorithm Actively protect data , Such as data confidentiality 、 Data integrity 、 Bidirectional strong Identity Authentication etc. , Data security is an active protection measure , The security of data itself must be based on reliable encryption algorithm and security system , There are mainly Symmetric algorithm And Public key cryptosystem Two kinds of . The second is the security of data protection , It mainly adopts modern information storage means to actively protect data , For example, through the disk array 、 The data backup 、 Disaster tolerance in other places And other means to ensure the security of data ,

Security of data processing It refers to how to effectively prevent data from entering 、 Handle 、 Due to hardware failure in statistics or printing 、 power failure 、 crash 、 Human misoperation 、 Procedural defects 、 Database damage or data loss caused by viruses or hackers , Some sensitive or confidential data may not be read by qualified personnel or operators , And cause data leakage and other consequences .

Data storage security It refers to the readability of the database beyond the operation of the system . Once the database is stolen , Even without the original system program , You can also write another program to view or modify the stolen database . From this point of view , An unencrypted database is not secure , Easy to cause commercial leakage , Therefore, the concept of data leakage prevention is derived , This involves Computer network communication Confidentiality of 、 Safety and software protection Other questions .


 

 

 

 

  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

原网站

版权声明
本文为[Silicon based workshop of slow fire rock sugar]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/186/202207050154177316.html