Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Network security fill in the blanks

2025-04-01 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Chapter 1

1. The three basic goals of information security are confidentiality, integrity and availability. In addition, there is another goal that can not be ignored: legal use.

2. There are four basic security threats in the network: information leakage, integrity destruction, denial of service and illegal use.

3. Access control policies can be divided into mandatory access control policies and autonomous access control policies.

4. Security * can be divided into passive * * and active * *.

5. The five types of security services defined by X.800 are authentication, access control, data confidentiality, data integrity and non-repudiation.

6. The eight specific security mechanisms defined by X.800 are: encryption, digital signature, access control, data integrity, authentication exchange, traffic filling, routing control and notarization.

7. The five common security mechanisms defined by X.800 are: trusted function, security flag, event detection, security audit tracking and security recovery.

Chapter 2

1. The IPv4 length of the host is 32b, and the MAC address length of the host is 48b. The address length of IPv6 is 128b.

2. The main function of ARP is to translate IP addresses into physical addresses.

3. The main function of NAT is to realize the translation between network address and IP address, which solves the problem of shortage of IPv4 address.

4. DNS service uses port 53, which is used to map domain name to IP address or IP address to domain name.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report