当前位置:网站首页>Xin'an Second Edition; Chapter 11 learning notes on the principle and application of network physical isolation technology
Xin'an Second Edition; Chapter 11 learning notes on the principle and application of network physical isolation technology
2022-07-06 17:34:00 【Moon Dream Studio】
One 、 The outline of this chapter requires
11、 Principle and application of network physical isolation technology
11.1 Overview of network physical isolation
• The concept of network physical isolation • Working principle of network physical isolation
11.2 Network physical isolation system and type
• Composition of network physical isolation system • Two way network physical isolation system
• One way network physical isolation system • Terminal physical isolation system
11.3 Network physical isolation mechanism and Implementation Technology
• Special purpose computers • many PC• Internet proxy service • Internal and external network line switcher
• Internal and external partitions of a single hard disk • Dual hard disk
• Gatekeeper • Protocol isolation technology • Unidirectional transmission unit • Information ferry Technology • Physical disconnection Technology
11.4 Main technical indicators and products of network physical isolation
• Main technical indicators of network physical isolation ( Understanding of functional technical indicators 、 Understanding of performance and technical indicators 、 Understanding of safety technical indicators )
• Analysis of working mechanism of network physical isolation products 、 Understanding of network physical isolation product standards 、 Applicable scenarios of network physical isolation products
11.5 Network physical isolation Application
• Intranet users can safely access the Internet
• The business production network is isolated from the Internet
• Internal and external network security physical isolation
• Information exchange in different security areas
Two 、 List of important and easy knowledge points in this chapter
11.1 Overview of network physical isolation
In order to achieve a higher level of network security , Network security experts suggest ,“ Internal and external networks and online computers realize physical isolation , In order to reduce the threat from the Internet ”.《 Regulations on the confidentiality management of the international networking of computer information systems 》 Article 6 of Chapter II stipulates ,“ A computer information system involving state secrets , It shall not be directly or indirectly connected with the Internet or other public information networks , Physical isolation must be carried out .”
It can meet the information and data exchange needs of internal and external networks , Security technology, which can prevent network security incidents, came into being , This technology is called “ Physical isolation
边栏推荐
- Uipath browser performs actions in the new tab
- Garbage first of JVM garbage collector
- 2021-03-22 "display login screen during recovery" can't be canceled. The appearance of lock screen interface leads to the solution that the remotely connected virtual machine can't work normally
- Detailed explanation of data types of MySQL columns
- On the clever use of stream and map
- PostgreSQL 14.2, 13.6, 12.10, 11.15 and 10.20 releases
- SQL调优小记
- Only learning C can live up to expectations top2 P1 variable
- Akamai anti confusion
- 自动化运维利器-Ansible-Playbook
猜你喜欢
Wu Jun trilogy insight (IV) everyone's wisdom
06 products and promotion developed by individuals - code statistical tools
JVM garbage collector part 2
Flink analysis (II): analysis of backpressure mechanism
04个人研发的产品及推广-数据推送工具
PySpark算子处理空间数据全解析(4): 先说说空间运算
C WinForm series button easy to use
连接局域网MySql
Flink 解析(四):恢复机制
TCP connection is more than communicating with TCP protocol
随机推荐
Flink 解析(六):Savepoints
Flink 解析(五):State与State Backend
Akamai anti confusion
Automatic operation and maintenance sharp weapon ansible Foundation
ByteDance overseas technical team won the championship again: HD video coding has won the first place in 17 items
Flink 解析(七):时间窗口
Automatic operation and maintenance sharp weapon ansible Playbook
学习投资大师的智慧
JVM garbage collector part 2
Flink源码解读(三):ExecutionGraph源码解读
Program counter of JVM runtime data area
SQL调优小记
mysql高级(索引,视图,存储过程,函数,修改密码)
Final review of information and network security (full version)
JVM class loading subsystem
Development and practice of lightweight planning service tools
The problem of "syntax error" when uipath executes insert statement is solved
JVM 垃圾回收器之Serial SerialOld ParNew
[mmdetection] solves the installation problem
Detailed explanation of data types of MySQL columns