In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
I would like to share with you what information security mainly includes in the computer network. I believe most people don't know much about it, so share this article for your reference. I hope you will gain a lot after reading this article. Let's learn about it together.
Information security mainly includes: 1, physical security mainly includes environmental security, equipment security and media security; 2, operational security mainly includes backup and recovery, virus detection and elimination and electromagnetic compatibility; 3, information security; 4, security and confidentiality management.
Information security mainly includes the following five aspects, namely, confidentiality, authenticity, integrity, unauthorized replication and security of parasitic systems.
Information system security includes:
1) physical security. Physical security mainly includes environmental security, equipment security and media security. Effective technical precautions should be taken in the central room of the system dealing with secret information. Important systems should also be equipped with security personnel for area protection.
(2) safe operation. Operational security mainly includes backup and recovery, virus detection and elimination, and electromagnetic compatibility. The main equipment, software, data, power supply, etc., of the confidential system should be backed up, and the system can be restored in a short time. Antivirus and antivirus software approved by the relevant national authorities should be used for timely detection and disinfection, including server and client virus and antivirus software.
(3) Information security. Ensuring the confidentiality, integrity, availability and non-repudiation of information is the core task of information security.
(4) Security and confidentiality management. The security and security management of classified computer information systems includes three aspects: management organization, management system and management technology at all levels. Establish a sound security management organization, establish security management personnel, establish a strict security management system, and use advanced security management technology to manage the entire confidential computer information system.
Information security itself covers a wide range of areas, including how to prevent the disclosure of commercial secrets, prevent young people from browsing bad information and divulging personal information.
The information security system in the network environment is the key to ensure information security, including computer security operating system, various security protocols, security mechanisms (digital signature, message authentication, data encryption, etc.), until the security system, such as UniNAC, DLP and other security vulnerabilities may threaten the global security.
Information security means that information systems (including hardware, software, data, personnel, physical environment and infrastructure) are protected from being destroyed, changed, leaked for unexpected or malicious reasons, and the system can run continuously and reliably. Information services will not be interrupted and business continuity will eventually be achieved.
Information security rules can be divided into two levels: narrow security and general security. Narrow security is based on the field of computer security based on encryption. Early Chinese information security majors usually take this as a benchmark, supplemented by computer technology and communication network technology. Content related to programming; generalized information security is a comprehensive discipline, from traditional computer security to information security, not only name change is an extension of security development, security is not a purely technical issue, but a combination of management, technical and legal issues.
This major trains senior information security professionals who can be engaged in computer, communications, e-commerce, e-government and e-finance.
Information security mainly involves three aspects: the security of information transmission, the security of information storage and the audit of the information content transmitted by the network. Authentication is the process of verifying topics in a network. There are usually three ways to verify the identity of a principal. One is the secrets that the subject knows, such as passwords and keys; the second is the objects carried by the subject, such as smart cards and token cards; and the third is only the unique functions or capabilities of the subject, such as fingerprints, sounds, retinas or signatures. wait for.
Extended data:
Protective measures that can be taken against computer network information security
1. Adopting firewall technology is the main means to solve the problem of network security. The firewall means used in the computer network is to separate the internal network from the external network by logical means. He not only protects the internal information security of the network, but also organizes the illegal intrusion of external visitors, which is a technology to strengthen the connection between the internal network and the external network. By filtering, scanning and screening all kinds of data communicated through its network, the firewall physically ensures the information security of the computer network.
2. Intrusion detection of access data is a new generation of network information security means after data encryption, firewall and other traditional security measures. Intrusion detection analyzes and decodes the information from the key nodes in the computer network, and filters out whether there are factors that threaten the information security of the computer network. Once the threat is detected, it will make the corresponding response at the same time. According to the different detection methods, it can be divided into error detection system, anomaly detection system and hybrid intrusion detection system.
3. The encryption technology of network information is a very important technical means and effective measure. Through the encryption of the transmitted information, it can effectively protect the information transmitted in the network from malicious theft or tampering. In this way, even if the attacker intercepts the information, he will not be able to know the content of the information. This method can make some confidential data available only to people with access rights.
4. Controlling access rights is also one of the important means to protect computer network information security, which is based on identity authentication. When illegal visitors attempt to enter the system to steal data, they are blocked by access rights. Access control skills can not only ensure users' normal access to information resources on the network, but also prevent illegal intrusion to ensure security. The content of access control includes: user identity identification and authentication, access control and audit tracking.
The above is all the contents of the article "what does Information Security in computer Network mainly include?" Thank you for your reading! I believe we all have a certain understanding, hope to share the content to help you, if you want to learn more knowledge, welcome to follow the industry information channel!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.