当前位置:网站首页>Network Security Learning (I)
Network Security Learning (I)
2022-07-29 06:37:00 【Dtsuv】
Network Security Learning ( One )
Basic attributes of network security
People have three basic needs for network security
confidentiality (Confidentiality)、 integrity (Integrity)、 Usability (Availability).
confidentiality
Confidentiality not only includes the confidentiality of information content , It also includes the confidentiality of information status , Such as in military war , Even if you can't crack the other party's encrypted message , However, some important conclusions can be inferred from the sudden increase of communication traffic . For example, the enemy may carry out a large number of military activities next , Or military deployment .
integrity
Integrity refers to the characteristics of information that cannot be changed without authorization . That is, information will not be accidentally or deliberately deleted during storage or transmission 、 modify 、 forge 、 Disorder 、 replay 、 Insert broken and missing features such as . Typical cases of threats to integrity are those where the source of the threat manipulates user accounts and tampers with information , Such as changing bank accounts , In this way, even if the user's information is not stolen , No longer accurate .
Usability
Availability refers to the feature that information can be accessed by authorized entities and used on demand .
Evolution history of network security
Communication security phase
The main security issues are eavesdropping and analysis .
Computer security
20 century 70 years , The US National Bureau of standards published the data encryption standard (DES)、 Us department of defense (DoD) Working face 《 Evaluation criteria for trusted computer systems 》(TCSEC)
Information system security
20 century 90 After year , Information system security has become the core content of network security . At this stage, in addition to emphasizing confidentiality 、 integrity 、 Usability , People also pay attention to “ Non repudiation ”.
1993 year 6 month , The United States government, together with Canada and the European community, drafted a single general guideline (CC standard ) And push it to international standards . To develop CC The purpose of the standard is to establish a general security evaluation criterion for information security products and systems that can be accepted by all countries .
In the United States TCSEC、 Europe's ITSEC、 Canadian CTCPEC、 In the United States FC And other information security guidelines , from 6 A country 7 Fang ( National security administration and National Institute of technical standards 、 Add 、 Britain 、 Law 、 Virtue 、 Lotus ) They put forward “ General guidelines for information technology security evaluation (The Common Criteriafor Information Technology security Evaluation,cC ) ”, abbreviation CC standard , It integrates the existing information security norms and Standards , Formed a more comprehensive framework .
Cyberspace Security
Get into 21 century , The Internet has gradually become Jihai 、 lu 、 empty 、 The fifth largest human living space after days . Cyberspace Security has attracted great attention from all countries , Developed countries generally regard it as the basis of national security , Rise to the height of national security to understand and treat . Only from the traditional confidentiality 、 integrity 、 Usability is obviously not enough , We need to pay more attention to politics at the national level 、 economic 、 Culture 、 Military and other influences .
边栏推荐
- day04_数组
- FPGA - odd even frequency division and decimal frequency division code routine
- day13_多线程下
- FPGA—奇偶数分频和小数分频代码例程
- Design and simulation code of 4-bit subtracter based on FPGA
- 虹科分享 | 如何测试与验证复杂的FPGA设计(1)——面向实体或块的仿真
- Unity初学3——敌人的移动控制和掉血区域的设置(2d)
- 虹科为您分享EtherCAT demo,教您如何从其他协议快速过渡到EtherCAT工业总线
- PDO的使用
- Clickhouse failed to import CSV without error but no data
猜你喜欢

浅谈缺陷描写样式

Access、Hybrid和Trunk三种模式的理解

Thinking about MySQL taking shell through OS shell

Vivado IP核之复数浮点数除法 Floating-point

2022 summer second day information competition learning achievement sharing 2

虹科Automation softPLC | MoDK运行环境与搭建步骤(1)——运行环境简介

Vivado IP核之浮点数乘除法 Floating-point

day03_1_流程控制

Why are the job requirements for software testing in 2022 getting higher and higher? Is there any secret in it?

Arrays & object & System & Math & random & Packaging
随机推荐
day09_ Static & Final & code block & abstract class & Interface & internal class
八、 网络安全
FIR filter design (1) -- using the FDATool toolbox of MATLAB to design FIR filter parameters
虹科分享 | 带您全面认识“CAN总线错误”(一)——CAN总线错误与错误帧
Self study understanding of [chain forward star]
什么是DNS放大攻击
子网数、主机数与子网掩码的关系
六、 网络互联与互联网
右值引用和移动构造
TCP套接口通信实验
Multiple IO usage
IGMP protocol software development experiment
Clickhouse failed to import CSV without error but no data
网络安全学习(一)
基于FPGA的IIR型滤波器设计
虹科案例 | PAC:一种整合了softPLC控制逻辑、HMI和其他服务功能的集成控制解决方案
Thinking about MySQL taking shell through OS shell
What is the lifecycle of automated testing?
day03_2_作业
Circular linked list and bidirectional linked list