当前位置:网站首页>[technology development-26]: data security of new information and communication networks
[technology development-26]: data security of new information and communication networks
2022-07-05 01:58:00 【Silicon based workshop of slow fire rock sugar】
Preface :
Network security , Usually refers to computer network The safety of the , In fact, it can also refer to computer Communication network The safety of the . Computer communication network is the interconnection of several computers with independent functions through communication equipment and transmission media , With the support of communication software , A system that realizes information transmission and exchange between computers . Computer network refers to Shared resources For the purpose , utilize Means of communication Put several independent computer systems that are relatively scattered in the region 、 The terminal equipment is connected with the data equipment , And exchange data under the control of the protocol . The fundamental purpose of computer network is resource sharing , Communication network is the way to realize network resource sharing , therefore , Computer networks are secure , The corresponding computer communication network must also be secure , It should be able to realize... For network users Information switching And Resource sharing . Below , Network security refers to computer network security , Also refers to computer communication network security .
The basic meaning of safety : Objectively, there is no threat , Subjectively, there is no fear . That is, the object is not worried about its normal state being affected . Network security can be defined as : A network system is free from any threat and infringement , It can normally realize the function of resource sharing . To make the network realize the function of resource sharing normally , First of all, we must ensure the hardware of the network 、 The software can run normally , Then we should ensure the security of data information exchange . You can see from the previous two sections , Due to the abuse of resource sharing , It leads to network security problems . Therefore, the technical way of network security is to implement limited sharing .
Definition of data security , By taking necessary measures , Make sure data In a state of effective protection and legal utilization , And the ability to maintain a state of continued security . Data security is the whole process security of data processing , Data processing , Including data collection 、 Storage 、 Use 、 machining 、 transmission 、 Provide 、 Open, etc .
Information security or data security have opposite meanings : One is the security of the data itself , Mainly refers to the adoption of modern cryptographic algorithm Actively protect data , Such as data confidentiality 、 Data integrity 、 Bidirectional strong Identity Authentication etc. , Data security is an active protection measure , The security of data itself must be based on reliable encryption algorithm and security system , There are mainly Symmetric algorithm And Public key cryptosystem Two kinds of . The second is the security of data protection , It mainly adopts modern information storage means to actively protect data , For example, through the disk array 、 The data backup 、 Disaster tolerance in other places And other means to ensure the security of data ,
Security of data processing It refers to how to effectively prevent data from entering 、 Handle 、 Due to hardware failure in statistics or printing 、 power failure 、 crash 、 Human misoperation 、 Procedural defects 、 Database damage or data loss caused by viruses or hackers , Some sensitive or confidential data may not be read by qualified personnel or operators , And cause data leakage and other consequences .
Data storage security It refers to the readability of the database beyond the operation of the system . Once the database is stolen , Even without the original system program , You can also write another program to view or modify the stolen database . From this point of view , An unencrypted database is not secure , Easy to cause commercial leakage , Therefore, the concept of data leakage prevention is derived , This involves Computer network communication Confidentiality of 、 Safety and software protection Other questions .


























边栏推荐
- Phpstrom setting function annotation description
- Educational Codeforces Round 122 (Rated for Div. 2) ABC
- Codeforces Global Round 19 ABC
- Win:使用 PowerShell 检查无线信号的强弱
- Hedhat firewall
- R language uses logistic regression and afrima, ARIMA time series models to predict world population
- Win: enable and disable USB drives using group policy
- Advanced conditional statements of common SQL operations
- Video display and hiding of imitation tudou.com
- R语言用logistic逻辑回归和AFRIMA、ARIMA时间序列模型预测世界人口
猜你喜欢

PHP wechat official account development

JVM's responsibility - load and run bytecode

He was laid off.. 39 year old Ali P9, saved 150million

Security level

Win:使用 Shadow Mode 查看远程用户的桌面会话
![[OpenGL learning notes 8] texture](/img/77/a4a784a535ea6f4c2382857b266cec.jpg)
[OpenGL learning notes 8] texture

Official announcement! The third cloud native programming challenge is officially launched!

PowerShell:在代理服务器后面使用 PowerShell

Binary tree traversal - middle order traversal (golang)

MySQL regexp: Regular Expression Query
随机推荐
Express routing, express middleware, using express write interface
Main window in QT application
One click generation and conversion of markdown directory to word format
PowerShell: use PowerShell behind the proxy server
JVM's responsibility - load and run bytecode
DOM basic syntax
C basic knowledge review (Part 3 of 4)
es使用collapseBuilder去重和只返回某个字段
Process scheduling and termination
RichView TRVStyle MainRVStyle
Action News
[CTF] AWDP summary (WEB)
Flutter 2.10 update details
STM32 series - serial port UART software pin internal pull-up or external resistance pull-up - cause problem search
力扣剑指offer——二叉树篇
runc hang 导致 Kubernetes 节点 NotReady
Binary tree traversal - middle order traversal (golang)
Wechat applet: the latest WordPress black gold wallpaper wechat applet two open repair version source code download support traffic main revenue
. Net starts again happy 20th birthday
Wechat applet: independent background with distribution function, Yuelao office blind box for making friends