The core of network security is information security. Network information security mainly refers to protecting the target network information system so that it is not dangerous. Every link and point in network information security is very important. Let's take a look at the core of network security is information security.
The core of network security is information security 1. The core of network security is network information security, which ensures the reliable transmission of network information and is not stolen or tampered with. The basic function of network security is to ensure the normal operation and good availability of the network system.
The core of network information security is to protect the confidentiality, integrity, authenticity, reliability, availability, non-repudiation and controllability of messages transmitted, exchanged and stored in public network information systems through computer, network technology, cryptography and security technology. Its core is information encryption technology.
Two views on network security;
1) attack mode determines the development direction of network security technology;
2) At present, most defenders can't resist attacks from hackers (let's just take access to the intranet as a measure). These two viewpoints, especially the second viewpoint, have clear validity. With the continuous updating and iteration of technology, it may change in a few years, but it is obvious at present. If I give a score of 100 for the protection of current key information infrastructure units, I will get 50 points, which is almost enough.
Deeply understand a concept: attackers are never concerned about your IP assets, but the corresponding vulnerabilities in your IP assets. Vulnerability is just an entrance. Whether to destroy or steal data is a long-term issue. At least one entrance should be paved first. The vulnerability is not necessarily 0 days. A 1day can basically end the battle when the time difference reaches one hour.
In a very short time, the offensive and defensive sides reached a certain balance on the surface: you attacked my main server entrance, I stared at the main entrance, you scanned an IP with a vulnerability scanner for half an hour, and I also checked an IP with a vulnerability scanner for half an hour, and everyone fought hand to hand. Because the attacker has no particularly good way to find the weakness faster than the defender.
At that time, everyone's logic was to match the IP list irregularly with a full vulnerability library. There is a reason why vulnerability scanners are recognized by both offensive and defensive parties.
The core of network security is information security. 2. Every link and point in network information security is very important.
But if we have to say which is the core, and there is only one core, it is that cryptography is the core and key of network information security.
The security of network information mainly refers to protecting the target network information system from dangers, accidents and threats.
The goal of network information security is mainly manifested in confidentiality, integrity, authenticity, reliability, availability and non-repudiation.
Cryptography is a subject that studies how to transmit information in secret. In modern times, especially the mathematical research on information and its transmission is often regarded as a branch of mathematics and computer science, and it is also closely related to information theory. Cryptography is about how to communicate in the presence of enemies. From the perspective of self-engineering, this is equivalent to the similarities and differences between cryptography and pure mathematics. Cryptography is the core of information security and other related issues, such as authentication and access control.
The main purpose of cryptography is to hide the meaning of information, not its existence. Cryptography also promotes computer science, especially technologies used in computer and network security, such as access control and information confidentiality.
Cryptography has been applied in daily life, including ATM chip cards, computer users' passwords, ssl certificates of various websites, encrypted virtual tunnel private networks, e-commerce platforms and so on.
The core of network security is information security. Device access security.
The sensing layer of video private network needs to access a large number of front-end devices such as cameras, which are numerous and widely distributed. Therefore, the security of equipment is mainly considered from the front-end sensing node to the gateway node, and security measures should be taken from the front-end, terminal and host.
At the front end, due to the single function, weak computing power and lack of security protection ability of front-end devices such as cameras, administrators often cannot make timely and effective treatment when the front-end devices are abnormal, and will face the risk of data leakage and malware infection.
Therefore, front-end security should establish a whitelist access mechanism of access data protocol and a front-end device access authentication mechanism, take effective measures such as active scanning, manual setting and real-time detection, and find unknown, counterfeit and illegal devices that are illegally accessed in time, and identify and filter the illegally accessed data based on the whitelist protocol, so as to realize the identification, early warning and real-time blocking of illegal malicious behaviors.
On the terminal side, in order to strengthen the monitoring of system operation, reduce unnecessary system services, enhance the system's ability to resist various attacks and viruses, and improve the overall security of the terminal system, we can take measures such as system security reinforcement, installing antivirus software, using online behavior management, deploying access control equipment and so on to reduce the security risks of the system itself. At the same time, because the administrator is the main user of the terminal, the safety management of the terminal users should be strengthened by formulating safety management systems such as usage norms.
As for the host, the host of the video private network mainly refers to each video management system in the video monitoring platform, and its security protection goal is to ensure the confidentiality, integrity and availability of each video management system in the process of data storage and processing. Because these host systems have security risks such as security vulnerabilities, lack of attack defense ability, lack of vulnerability repair ability and human misoperation, host security protection should not only consider the security of hardware, firmware and system software, but also take corresponding security technology and security management measures.
Network security
The network security of video private network mainly focuses on network boundary security and network transmission security, and specific security measures can be taken from border access control, internet security, link security and data security.
Border access control is to protect the network in depth by deploying the next generation firewall, security gateway and other equipment, and it is the first premise to realize a trusted network. In addition, it should also be effectively constructed from the perspective of five-tuple strategy for border security protection of source IP address, source port, destination IP address, destination port and protocol, so as to limit illegal access to the network and conduct integrated deep defense against network threats such as target network system vulnerabilities, protocol weaknesses, malicious attacks, abnormal traffic, virus worms and spyware.
Because there are a large number of attacks, viruses and other network security threats in the Internet, the video private network needs to strengthen security protection measures at the boundary of the video private network when accessing the Internet. In order to prevent unauthorized access and illegal attacks, border protection products such as firewalls should be deployed and detected and filtered according to strict security policies and rules; At the same time, in view of various attacks on the Internet, we will deploy intrusion prevention equipment and anti-DDoS attack equipment, focusing on monitoring and detecting network attacks and defending network application attacks.
Ensuring link security is an important basis to ensure the secure transmission of private networks. In the process of data transmission, if the network equipment or link fails, the video transmission is easily interrupted, which can not meet the requirements of real-time video monitoring. Therefore, hardware redundancy should be used to back up data links and network devices to ensure uninterrupted transmission of video data in case of physical failure.
Data security mainly emphasizes the security of video data itself. From the security objectives of data confidentiality, data integrity and data availability, corresponding security technical measures should be taken to ensure the security of data transmission and storage.
Among them, in order to better deal with the security risks such as data interception and theft that may be involved in the data transmission process, encryption technologies such as accessing the Web management platform based on Https and encryption transmission based on encryption and decryption machines should be adopted to encrypt data through application interaction and data transmission. In data storage, it is necessary to implement access control for administrators who operate data-related devices, and realize data storage security through hardware redundancy.