当前位置:网站首页>Network Security Learning (I)
Network Security Learning (I)
2022-07-29 06:37:00 【Dtsuv】
Network Security Learning ( One )
Basic attributes of network security
People have three basic needs for network security
confidentiality (Confidentiality)、 integrity (Integrity)、 Usability (Availability).
confidentiality
Confidentiality not only includes the confidentiality of information content , It also includes the confidentiality of information status , Such as in military war , Even if you can't crack the other party's encrypted message , However, some important conclusions can be inferred from the sudden increase of communication traffic . For example, the enemy may carry out a large number of military activities next , Or military deployment .
integrity
Integrity refers to the characteristics of information that cannot be changed without authorization . That is, information will not be accidentally or deliberately deleted during storage or transmission 、 modify 、 forge 、 Disorder 、 replay 、 Insert broken and missing features such as . Typical cases of threats to integrity are those where the source of the threat manipulates user accounts and tampers with information , Such as changing bank accounts , In this way, even if the user's information is not stolen , No longer accurate .
Usability
Availability refers to the feature that information can be accessed by authorized entities and used on demand .
Evolution history of network security
Communication security phase
The main security issues are eavesdropping and analysis .
Computer security
20 century 70 years , The US National Bureau of standards published the data encryption standard (DES)、 Us department of defense (DoD) Working face 《 Evaluation criteria for trusted computer systems 》(TCSEC)
Information system security
20 century 90 After year , Information system security has become the core content of network security . At this stage, in addition to emphasizing confidentiality 、 integrity 、 Usability , People also pay attention to “ Non repudiation ”.
1993 year 6 month , The United States government, together with Canada and the European community, drafted a single general guideline (CC standard ) And push it to international standards . To develop CC The purpose of the standard is to establish a general security evaluation criterion for information security products and systems that can be accepted by all countries .
In the United States TCSEC、 Europe's ITSEC、 Canadian CTCPEC、 In the United States FC And other information security guidelines , from 6 A country 7 Fang ( National security administration and National Institute of technical standards 、 Add 、 Britain 、 Law 、 Virtue 、 Lotus ) They put forward “ General guidelines for information technology security evaluation (The Common Criteriafor Information Technology security Evaluation,cC ) ”, abbreviation CC standard , It integrates the existing information security norms and Standards , Formed a more comprehensive framework .
Cyberspace Security
Get into 21 century , The Internet has gradually become Jihai 、 lu 、 empty 、 The fifth largest human living space after days . Cyberspace Security has attracted great attention from all countries , Developed countries generally regard it as the basis of national security , Rise to the height of national security to understand and treat . Only from the traditional confidentiality 、 integrity 、 Usability is obviously not enough , We need to pay more attention to politics at the national level 、 economic 、 Culture 、 Military and other influences .
边栏推荐
- Inventory | major network security events of global key information infrastructure
- day15_ generic paradigm
- FPGA - odd even frequency division and decimal frequency division code routine
- day04_数组
- 基于FPGA的4位减法器设计及仿真代码
- What is the lifecycle of automated testing?
- How to pre circumvent the vulnerabilities of unsafe third-party components?
- 基于TCP的在线词典
- 虹科Automation softPLC | 虹科KPA MoDK运行环境与搭建步骤(2)——MoDK运行环境搭建
- 八、 网络安全
猜你喜欢
随机推荐
黑客攻击入侵服务器的6种常见方式
Multithreaded server programming
不安全的第三方组件的漏洞如何做前置规避?
FIR filter design (2) -- vivado calls IP core to design FIR filter
Solve the error that the simulation output is STX under the frequency division module Modelsim
四、 局域网和城域网
Arrays&Object&System&Math&Random&包装类
Common server faults and their solutions
Personal views on time complexity
SQL Developer图形化窗口创建数据库(表空间和用户)
What is DNS amplification attack
day12_ Multithreading
Leetcode刷题记录
虹科白皮书 | 在工业4.0阶段,如何利用TSN时间敏感网络技术打造数字化工厂?
IGMP协议软件开发实验
虹科分享 | FPGA 实现的直通与存储转发切换延迟
Several misunderstandings about DDoS
NoClassDefFoundError processing
Navicat for Oracle Cannot create oci environment
如何判断业务被DDoS攻击?又会造成哪些危害?





![Self study understanding of [chain forward star]](/img/b4/7f66026a482540bf27f088c321a840.png)



