In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
What is security software? generally speaking, security software is designed and developed for certain security purposes to prevent unsafe things from happening. For example, antivirus software is used to prevent * *, virus * * and infection; Internet bank security controls are used to safely enter passwords to prevent viruses from intercepting passwords; host monitoring audit software is used to prevent unauthorized operations on the host and to audit all operations.
Security software must have, at least, the following characteristics to be called security software:
1. Path uniqueness
This is what the security software should at least do. We must ensure that after the implementation of the security software, we can bring the control operations and objects into a unique controlled path. If there are unsupervised loopholes and back doors in the security software, then this kind of security software exists in vain and cannot be called security software. Therefore, the security software should do a good job in the research of path uniqueness at the beginning of the design, and constantly improve the path uniqueness in the follow-up, and block or supervise all possible branch paths.
2. Independent security
Security software should achieve independent security as far as possible, rather than relying on other means to ensure its own security. Relying on other uncertain means for one's own security will cause extreme insecurity. To take a simple example, some enterprise security software rely on the client to achieve security monitoring, but this security software itself does not have anti-uninstall function, then you can imagine that such security software does not play a security role at all.
3. Internal security
Security software should not only serve some security purposes, but also pay attention to its own security vulnerabilities and risks. Imagine that the internal security of the software cannot be done well. Who would believe that you can do other things well? I have come into contact with a lot of security software, to tell you the truth, water products are mixed, some products are almost perfect, and some products are so bad that there is such an old-fashioned loophole in sql injection that I have to admire these manufacturers. Several common problems are listed here: SQL injection vulnerability, password plaintext storage or symmetrical encryption storage, code unconfused, web page without identity verification, network plaintext transmission, network disconnection security failure, and so on.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.