当前位置:网站首页>Network Security Learning (I)
Network Security Learning (I)
2022-07-29 06:37:00 【Dtsuv】
Network Security Learning ( One )
Basic attributes of network security
People have three basic needs for network security
confidentiality (Confidentiality)、 integrity (Integrity)、 Usability (Availability).
confidentiality
Confidentiality not only includes the confidentiality of information content , It also includes the confidentiality of information status , Such as in military war , Even if you can't crack the other party's encrypted message , However, some important conclusions can be inferred from the sudden increase of communication traffic . For example, the enemy may carry out a large number of military activities next , Or military deployment .
integrity
Integrity refers to the characteristics of information that cannot be changed without authorization . That is, information will not be accidentally or deliberately deleted during storage or transmission 、 modify 、 forge 、 Disorder 、 replay 、 Insert broken and missing features such as . Typical cases of threats to integrity are those where the source of the threat manipulates user accounts and tampers with information , Such as changing bank accounts , In this way, even if the user's information is not stolen , No longer accurate .
Usability
Availability refers to the feature that information can be accessed by authorized entities and used on demand .
Evolution history of network security
Communication security phase
The main security issues are eavesdropping and analysis .
Computer security
20 century 70 years , The US National Bureau of standards published the data encryption standard (DES)、 Us department of defense (DoD) Working face 《 Evaluation criteria for trusted computer systems 》(TCSEC)
Information system security
20 century 90 After year , Information system security has become the core content of network security . At this stage, in addition to emphasizing confidentiality 、 integrity 、 Usability , People also pay attention to “ Non repudiation ”.
1993 year 6 month , The United States government, together with Canada and the European community, drafted a single general guideline (CC standard ) And push it to international standards . To develop CC The purpose of the standard is to establish a general security evaluation criterion for information security products and systems that can be accepted by all countries .
In the United States TCSEC、 Europe's ITSEC、 Canadian CTCPEC、 In the United States FC And other information security guidelines , from 6 A country 7 Fang ( National security administration and National Institute of technical standards 、 Add 、 Britain 、 Law 、 Virtue 、 Lotus ) They put forward “ General guidelines for information technology security evaluation (The Common Criteriafor Information Technology security Evaluation,cC ) ”, abbreviation CC standard , It integrates the existing information security norms and Standards , Formed a more comprehensive framework .
Cyberspace Security
Get into 21 century , The Internet has gradually become Jihai 、 lu 、 empty 、 The fifth largest human living space after days . Cyberspace Security has attracted great attention from all countries , Developed countries generally regard it as the basis of national security , Rise to the height of national security to understand and treat . Only from the traditional confidentiality 、 integrity 、 Usability is obviously not enough , We need to pay more attention to politics at the national level 、 economic 、 Culture 、 Military and other influences .
边栏推荐
- Joint use skills of joiner.on and stream().Map
- 用神经网络实现手写数字识别
- 基于FPGA的4位减法器设计及仿真代码
- FPGA - odd even frequency division and decimal frequency division code routine
- Summary of winter vacation training (1.23~1.28) [first tier]
- Leetcode刷题记录
- 网络安全学习(二)
- How to pre circumvent the vulnerabilities of unsafe third-party components?
- 不安全的第三方组件的漏洞如何做前置规避?
- 2022 summer second day information competition learning achievement sharing 2
猜你喜欢

FIR滤波器设计(2)——Vivado调用IP核设计FIR滤波器

day03_1_流程控制

浅谈缺陷描写样式

Redshift restore SP effect - SP map export settings and map import configuration

day12_多线程
![[leetcode skimming] array 1 - double pointer](/img/c3/a671395e20fad58f1c7f6abc6e1a39.png)
[leetcode skimming] array 1 - double pointer

JVM memory structure
![Self study understanding of [chain forward star]](/img/b4/7f66026a482540bf27f088c321a840.png)
Self study understanding of [chain forward star]

使用STP生成树协议解决网络中的二层环路问题

Vivado IP核之复数浮点数除法 Floating-point
随机推荐
Personal views on time complexity
虹科白皮书 | 在工业4.0阶段,如何利用TSN时间敏感网络技术打造数字化工厂?
2022年的软件测试的岗位要求为何越来越高?这其中有什么不可告人的秘密吗?
Plugin location in mavan
服务器常见故障及其解决方法
day14_ Unit test & Date common class & String common class
盘点 | 全球关键信息基础设施网络安全大事件
虹科分享 | 带您全面认识“CAN总线错误”(一)——CAN总线错误与错误帧
Idea installing Scala
day17_集合下
Ultra low cost DDoS attacks are coming. See how WAF protects Jedi
day12_ Multithreading
day03_1_流程控制
TCP socket communication experiment
高级套接口编程(选项和控制信息)
九、 组网技术
OSPF理论介绍
Is it OK to directly compare the size of two numbers in FPGA?
网站受DDoS攻击的表现以及查看方法
What if the 80443 port of the website server has been maliciously attacked?