当前位置:网站首页>[technology development-26]: data security of new information and communication networks
[technology development-26]: data security of new information and communication networks
2022-07-05 01:58:00 【Silicon based workshop of slow fire rock sugar】
Preface :
Network security , Usually refers to computer network The safety of the , In fact, it can also refer to computer Communication network The safety of the . Computer communication network is the interconnection of several computers with independent functions through communication equipment and transmission media , With the support of communication software , A system that realizes information transmission and exchange between computers . Computer network refers to Shared resources For the purpose , utilize Means of communication Put several independent computer systems that are relatively scattered in the region 、 The terminal equipment is connected with the data equipment , And exchange data under the control of the protocol . The fundamental purpose of computer network is resource sharing , Communication network is the way to realize network resource sharing , therefore , Computer networks are secure , The corresponding computer communication network must also be secure , It should be able to realize... For network users Information switching And Resource sharing . Below , Network security refers to computer network security , Also refers to computer communication network security .
The basic meaning of safety : Objectively, there is no threat , Subjectively, there is no fear . That is, the object is not worried about its normal state being affected . Network security can be defined as : A network system is free from any threat and infringement , It can normally realize the function of resource sharing . To make the network realize the function of resource sharing normally , First of all, we must ensure the hardware of the network 、 The software can run normally , Then we should ensure the security of data information exchange . You can see from the previous two sections , Due to the abuse of resource sharing , It leads to network security problems . Therefore, the technical way of network security is to implement limited sharing .
Definition of data security , By taking necessary measures , Make sure data In a state of effective protection and legal utilization , And the ability to maintain a state of continued security . Data security is the whole process security of data processing , Data processing , Including data collection 、 Storage 、 Use 、 machining 、 transmission 、 Provide 、 Open, etc .
Information security or data security have opposite meanings : One is the security of the data itself , Mainly refers to the adoption of modern cryptographic algorithm Actively protect data , Such as data confidentiality 、 Data integrity 、 Bidirectional strong Identity Authentication etc. , Data security is an active protection measure , The security of data itself must be based on reliable encryption algorithm and security system , There are mainly Symmetric algorithm And Public key cryptosystem Two kinds of . The second is the security of data protection , It mainly adopts modern information storage means to actively protect data , For example, through the disk array 、 The data backup 、 Disaster tolerance in other places And other means to ensure the security of data ,
Security of data processing It refers to how to effectively prevent data from entering 、 Handle 、 Due to hardware failure in statistics or printing 、 power failure 、 crash 、 Human misoperation 、 Procedural defects 、 Database damage or data loss caused by viruses or hackers , Some sensitive or confidential data may not be read by qualified personnel or operators , And cause data leakage and other consequences .
Data storage security It refers to the readability of the database beyond the operation of the system . Once the database is stolen , Even without the original system program , You can also write another program to view or modify the stolen database . From this point of view , An unencrypted database is not secure , Easy to cause commercial leakage , Therefore, the concept of data leakage prevention is derived , This involves Computer network communication Confidentiality of 、 Safety and software protection Other questions .
边栏推荐
- Restful fast request 2022.2.1 release, support curl import
- Security level
- RichView TRVUnits 图像显示单位
- Flutter 2.10 update details
- STL container
- RichView TRVStyle MainRVStyle
- Database postragesq peer authentication
- WCF: expose unset read-only DataMember property- WCF: Exposing readonly DataMember properties without set?
- 如何做一个炫酷的墨水屏电子钟?
- The steering wheel can be turned for one and a half turns. Is there any difference between it and two turns
猜你喜欢
Five ways to query MySQL field comments!
Action News
Wechat applet: new independent backstage Yuelao office one yuan dating blind box
Win: use PowerShell to check the strength of wireless signal
Video display and hiding of imitation tudou.com
[OpenGL learning notes 8] texture
DOM basic syntax
How to safely eat apples on the edge of a cliff? Deepmind & openai gives the answer of 3D security reinforcement learning
【附源码】基于知识图谱的智能推荐系统-Sylvie小兔
Codeforces Global Round 19 ABC
随机推荐
Go RPC call
batchnorm. Py this file single GPU operation error solution
Blue Bridge Cup Square filling (DFS backtracking)
Numpy library introductory tutorial: basic knowledge summary
R language uses logistic regression and afrima, ARIMA time series models to predict world population
Pytorch fine tuning (Fortune): hollowed out design or cheating
Win:使用 PowerShell 检查无线信号的强弱
Matrixone 0.2.0 is released, and the fastest SQL computing engine is coming
Interpretation of mask RCNN paper
Exploration and practice of integration of streaming and wholesale in jd.com
Nebula importer data import practice
Common bit operation skills of C speech
流批一体在京东的探索与实践
179. Maximum number - sort
PHP 约瑟夫环问题
Win: add general users to the local admins group
Educational Codeforces Round 122 (Rated for Div. 2) ABC
Action News
Change the background color of a pop-up dialog
"2022" is a must know web security interview question for job hopping