In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-11 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
This article will explain what computer network security means for you in detail. The editor thinks it is very practical, so I share it for you as a reference. I hope you can get something after reading this article.
Computer network security means to protect the hardware, software and data resources in the computer network system from being destroyed, changed or leaked because of accidental or malicious reasons, so that the network system can operate continuously and reliably, and the network service is normal and orderly.
Computer network security includes not only the hardware of networking, the software of managing and controlling the network, but also shared resources and fast network services, so the definition of network security should cover all the contents involved in the computer network. With reference to the definition of computer security given by ISO, it is considered that computer network security refers to: "protect the hardware, software and data resources in the computer network system from being destroyed, changed or leaked because of accidental or malicious reasons, so that the network system can operate continuously and reliably, and the network service is normal and orderly."
Computer network security refers to the use of network management control and technical measures to ensure that the confidentiality, integrity and usability of data are protected in a network environment. Computer network security includes two aspects, namely, physical security and logical security. Physical security means that the system equipment and related facilities are physically protected from damage, loss, etc. Logical security includes the integrity, confidentiality and availability of information.
Potential threat
There are many factors that make computer information unsafe, including human factors, natural factors and occasional factors. Among them, the human factor means that some criminals take advantage of the loopholes in the computer network, or sneak into the computer room, steal computer system resources, illegally obtain important data, tamper with system data, destroy hardware equipment, and compile computer viruses. Human factor is the biggest threat to the security of computer information network. The factors of computer network insecurity are mainly manifested in the following aspects:
Confidentiality: a feature that does not disclose information to or for use by unauthorized users, entities, or processes.
Integrity: the characteristic that data cannot be changed without authorization. That is, the characteristic that the information will not be modified, destroyed or lost in the process of storage or transmission.
Availability: features that can be accessed by authorized entities and used on demand. That is, whether the required information can be accessed when needed. For example, denial of service in the network environment, destruction of the network and the normal operation of related systems are all attacks on availability.
Controllability: the ability to control the dissemination and content of information.
Reviewability: provide basis and means when security problems arise
This is the end of the article on "what does computer network security mean?". I hope the above content can be helpful to you, so that you can learn more knowledge. if you think the article is good, please share it for more people to see.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.