当前位置:网站首页>Network Security Learning (I)
Network Security Learning (I)
2022-07-29 06:37:00 【Dtsuv】
Network Security Learning ( One )
Basic attributes of network security
People have three basic needs for network security
confidentiality (Confidentiality)、 integrity (Integrity)、 Usability (Availability).
confidentiality
Confidentiality not only includes the confidentiality of information content , It also includes the confidentiality of information status , Such as in military war , Even if you can't crack the other party's encrypted message , However, some important conclusions can be inferred from the sudden increase of communication traffic . For example, the enemy may carry out a large number of military activities next , Or military deployment .
integrity
Integrity refers to the characteristics of information that cannot be changed without authorization . That is, information will not be accidentally or deliberately deleted during storage or transmission 、 modify 、 forge 、 Disorder 、 replay 、 Insert broken and missing features such as . Typical cases of threats to integrity are those where the source of the threat manipulates user accounts and tampers with information , Such as changing bank accounts , In this way, even if the user's information is not stolen , No longer accurate .
Usability
Availability refers to the feature that information can be accessed by authorized entities and used on demand .
Evolution history of network security
Communication security phase
The main security issues are eavesdropping and analysis .
Computer security
20 century 70 years , The US National Bureau of standards published the data encryption standard (DES)、 Us department of defense (DoD) Working face 《 Evaluation criteria for trusted computer systems 》(TCSEC)
Information system security
20 century 90 After year , Information system security has become the core content of network security . At this stage, in addition to emphasizing confidentiality 、 integrity 、 Usability , People also pay attention to “ Non repudiation ”.
1993 year 6 month , The United States government, together with Canada and the European community, drafted a single general guideline (CC standard ) And push it to international standards . To develop CC The purpose of the standard is to establish a general security evaluation criterion for information security products and systems that can be accepted by all countries .
In the United States TCSEC、 Europe's ITSEC、 Canadian CTCPEC、 In the United States FC And other information security guidelines , from 6 A country 7 Fang ( National security administration and National Institute of technical standards 、 Add 、 Britain 、 Law 、 Virtue 、 Lotus ) They put forward “ General guidelines for information technology security evaluation (The Common Criteriafor Information Technology security Evaluation,cC ) ”, abbreviation CC standard , It integrates the existing information security norms and Standards , Formed a more comprehensive framework .
Cyberspace Security
Get into 21 century , The Internet has gradually become Jihai 、 lu 、 empty 、 The fifth largest human living space after days . Cyberspace Security has attracted great attention from all countries , Developed countries generally regard it as the basis of national security , Rise to the height of national security to understand and treat . Only from the traditional confidentiality 、 integrity 、 Usability is obviously not enough , We need to pay more attention to politics at the national level 、 economic 、 Culture 、 Military and other influences .
边栏推荐
- SQL Developer图形化窗口创建数据库(表空间和用户)
- day03_2_作业
- 三、广域通信网
- [leetcode brush questions] array 3 - divide and conquer
- Common server faults and their solutions
- Redshift restore SP effect - SP map export settings and map import configuration
- 什么是DNS放大攻击
- Unity初学4——帧动画以及主角攻击(2d)
- Navicat for Oracle Cannot create oci environment
- Vivado IP核之浮点数乘除法 Floating-point
猜你喜欢
随机推荐
浅谈缺陷描写样式
Sequence list and linked list
HOG+SVM实现行人检测
Those vulnerability attacks on app
Multithreaded server programming
软件测试的优势有哪些?看看你了解多少.....
基于udp通信的在线多人聊天室
用神经网络实现手写数字识别
Why are the job requirements for software testing in 2022 getting higher and higher? Is there any secret in it?
虹科案例 | PAC:一种整合了softPLC控制逻辑、HMI和其他服务功能的集成控制解决方案
六、 网络互联与互联网
Verilog中for语句的使用
Vivado IP核之RAM Block Memery Generator
一文看懂网络安全五年之巨变
网站被挂马的解决方案
Traffic characteristics of webshell management tools
Multiple IO usage
虹科Automation softPLC | 虹科KPA MoDK运行环境与搭建步骤(3)——MoDK例程测试
八、 网络安全
什么是撞库及撞库攻击的基本原理








