Self Computer Network Security

Self computer network security first chapter (based on test sites summary)

Dian memorizing a part

1 Dian typical security threats facing computer network system

There are eavesdropping, retransmission, forgery, tampering, unauthorized access, denial of service attacks (also known as DDOS attacks), conduct denial (does not recognize the message), bypass control, electromagnetic / radio intercepts, staff negligence.

2 Dian computer network is not secure the main factors which

Incidental factors: such as power failures and software development process, the holes left or logical errors. Natural disasters: the threat of natural disasters caused by the computer system. Human factors: the destruction of the computing network, also known as human attacks on computer networks. (The official definition of a good mouthful) is also divided into several areas: 1 passive attack. 2 active attack. 4 3-neck recent attacks insider attacks (such as delete library on foot) 5 Distribution attack

Definition 3 Dian security of computer networks

Computer network security management is the use of control and technical measures to ensure that in a network environment, confidentiality, completeness and usability of information data is protected

4 Dian computer network security goals

Confidentiality integrity 1 2 3 4 availability repudiation 5 controllability
confidentiality is to ensure that information is not unauthorized access
integrity guarantee information is not modified during transmission, destruction
when the resource availability refers to the need to be used using
non-repudiation is to ensure that information on the perpetrator can not deny their information conduct
controllable means having control over the dissemination of information and content

5 Dian PPDR model

PPDR model is a common network security model, mainly consists of four parts security policy (the Policy), protection (ProtecUon), detection (Detection), response (Response).
Security Policy (Policy): the entire network security basis for
protection (ProtecUon): usually by some of the traditional static security technologies and methods to achieve, there are such as firewalls, encryption and authentication methods.
Detection (Detection): detection is dynamic response and strengthen protection based on
the response (response): response is the most effective way to solve security problems.
PPDR model mathematical formula expression: (P31 page)
formula 1: Pt> Dt> Rt
formula 2: Et = Dt + Rt, If Pt = 0

6 Dian major network security technology

1 physical security techniques secure data transmission 2 3 4 external network isolation technology intrusion detection Access Control 6 5 7 security auditing technology detection anti-virus technology 8 9 10 endpoint security backup technology

Two Dian understand

1 Dian OSI Security Architecture

1 security services, also known as safety precautions. OSI security architecture defines five categories of security services: authentication service, service access control, data confidentiality service, data integrity service, non-repudiation services.
2 security mechanisms. The basic security mechanisms are eight: encryption, digital signature scheme, access control mechanisms, data integrity mechanisms, authentication exchange mechanism, traffic flow filling mechanism, routing control mechanism and notarized.

2 Dian main content of network security management

1 2 Advanced technology and strict management of the majesty of the law 3

3 Dian trends of network security threats

1 more closely integrated with the Internet, all the ways you can take advantage of the spread
2 all viruses have a hybrid feature, set file infection, worms, Trojan horses and hacker programs with a devastating greatly increased.
3 diffusion fast, and more pay attention to deceptive
4 exploit loopholes in the system will be the mode of transmission of the virus and some of the most
developed 5 wireless networks, the possibility of remote network attacks increased
6 various foreign intelligence, intelligence officers will increasingly gather intelligence information through the network channels and steal information
7 Dian various viruses and worms, backdoor technology becomes more intelligent, and the emergence of the consolidation trend, the formation of mixed threats
8 a variety of attack techniques of secrecy enhanced conventional means to prevent it difficult to identify
9 technology for distributed computer attack the trend reinforced, high-strength password security threat to the
10 some government departments supercomputer resources will be exploited by attackers springboard
11 network management security issues have become increasingly prominent

4 network security technology trends

Network security is a multi-dimensional development of a full range of Dian, are: physical isolation 1 2 3 logical isolation defense virus 6 5 authentication encrypted communication and virtual private networks on 4 attack defense network from the network intrusion detection and active defense 7 8 Dian and network management audit evidence

Published an original article · won praise 1 · views 24

Guess you like

Origin blog.csdn.net/weixin_43660570/article/details/105202840