Network security knowledge excerpts:
1, network security, usually refers to the security of the computer network, in fact, can also refer to the security of the computer communication network. Computer communication network is a number of computers with independent functions through the communication equipment and transmission media interconnected, under the support of the communication software, the realization of the information transfer between computers and exchange of systems.
And computer network refers to the *** enjoy resources for the purpose of using communication means to geographically relatively dispersed a number of independent computer systems, terminal equipment and data equipment connected, and under the control of the protocol for the exchange of data system.
The fundamental purpose of the computer network is resource **** enjoyment, communication network is to realize the network resource **** enjoyment of the way, therefore, the computer network is safe, the corresponding computer communication network must be safe, should be able to realize the information exchange for network users and resource **** enjoyment.
2, the basic meaning of security: there is no objective threat, there is no subjective fear. That is, the object is not worried about its normal state is affected. Network security can be defined as: a network system is free from any threat and infringement, can normally realize the function of resource **** enjoyment. In order to make the network can normally realize the function of resource **** enjoyment, first of all, to ensure that the hardware and software of the network can operate normally, and then to ensure the security of data and information exchange.
3, narrow interpretation - network security in different application environments have different interpretations. For an operating system in the network, network security is the security of information processing and transmission. It includes the safe and reliable operation of the hardware system, the security of the operating system and application software, the security of the database system, the protection of electromagnetic information leakage and so on. Network security in the narrow sense focuses on the security of network transmission.
4. Five attributes of network security: confidentiality, integrity, availability, controllability and non-repudiation. These five attributes apply to a wide range of areas of the National Information Infrastructure (NII) such as education, entertainment, healthcare, transportation, national security, power supply and communications.
5. There are different types of network security due to different environments and applications. There are mainly the following types:
(1) System Security
Operational system security means ensuring the security of information processing and transmission systems. It focuses on ensuring the normal operation of the system. Avoid the destruction and loss of messages stored, processed and transmitted by the system due to the collapse and damage of the system. Avoid information leakage due to electromagnetic leakage overthrow, which produces information leakage and interferes with others or is interfered by others.
(2) network information security
Security of system information on the network. Including user password authentication, user access rights control, data access rights, mode control, security audit. Security issues follow the tread. Computer virus prevention and control, data encryption and so on.
(3) information dissemination security
Information dissemination security on the network, that is, the security of the consequences of information dissemination, including information filtering and so on. It focuses on preventing and controlling the consequences of the dissemination of illegal and harmful information, and avoiding the loss of control of information freely transmitted on public networks.
(4) Information content security
Security of information content on the network. It focuses on protecting the confidentiality, authenticity and integrity of information. Avoid attackers to use the system's security loopholes for eavesdropping, impersonation, fraud and other detrimental to the legitimate user's behavior. Its essence is to protect the interests and privacy of users.
Reference for the above: Baidu Encyclopedia-Network Security