-
Network security means that the hardware, software and data in the network system are protected from damage, alteration and leakage due to accidental or malicious reasons, and the system runs continuously, reliably and normally, and the network service is not interrupted.
Confidential information is not disclosed to or exploited by unauthorized users, entities or processes.
The integrity of the data is a feature that cannot be altered without authorization. That is, the information remains unmodified, destroyed and lost during storage or transmission.
Availability is a feature that can be accessed by authorized entities and used on demand. i.e. the ability to access the information you need, when you need it. For example, denial of service in the network environment, disruption of the normal operation of the network and related systems, etc., are all attacks on availability.
Controllability has the ability to control the dissemination and content of information.
Auditability. Provide evidence and means when security problems arise.
-
Network security usually refers to the security of computer networks, and in fact it can also refer to the security of computer communication networks. The computer communication network is a system that interconnects several computers with independent functions through communication equipment and transmission, and realizes information transmission and exchange between computers with the support of communication software. The computer network refers to the system that uses communication means to connect a number of independent computer systems, terminal equipment and data equipment that are relatively scattered in the region for the purpose of sharing resources, and exchanges data under the control of the protocol.
The fundamental purpose of the computer network is to share resources, and the communication network is the way to realize the sharing of network resources, therefore, the computer network is secure, and the corresponding computer communication network must also be secure, and it should be able to realize information exchange and resource sharing for network users. In the following, network security refers to both computer network security and computer communication network security.
The basic meaning of security: there is no threat objectively, and there is no fear subjectively. That is, the object does not worry about its normal state being affected.
Network security can be defined as: a network system is not subject to any threats and infringements, and can normally realize the function of resource sharing. In order to make the network realize the resource sharing function normally, it is necessary to ensure the normal operation of the hardware and software of the network, and then to ensure the security of data and information exchange.
As can be seen from the previous two sections, the abuse of resource sharing has led to network security problems. Therefore, the technical approach to cyber security is to implement limited sharing.
-
Cybersecurity is to prevent data from being destroyed, altered, or stolen. Ensure that the program runs normally.
Learn what you need to know about cybersecurity:
1) Familiar with the basic knowledge of computer systems; >>>More
A security certificate is a security setting, generally for online banking. >>>More
Big brother, how can you see that you have this tendency? b Khan.
In fact, the difficulty of network security is relative to whether it is difficult or not. Everyone is good at different skills, some people are good at digging problems, some people are good at analyzing problems, and learning network security is also related to interest, if you are interested in network security, and you are willing to spend time to learn, then it is easier to learn, and vice versa, there is a certain degree of difficulty in learning. >>>More
1. Standardized managementEnterprises formulate a network security management standard system, and employees must abide by it, assign different management permissions and role requirements to different management personnel of the first platform, and strictly divide management personnel to avoid management authority being in charge by the same person, causing potential security risks. >>>More