Computer Information Security

computer virus:

  -After a computer virus infects the system, it does not attack the computer immediately, but has a certain incubation period. It is latent in the external storage of the computer. The length of the incubation period is generally determined by the trigger conditions set by the virus program compiler.

Firewall:
  -The firewall can identify and block illegal requests, effectively prevent data access across permissions, but cannot filter viruses or defend.

Access control:
  According to different application environments, there are three main types of access control

    —Network access control

    —Host, operation access control

    —Application access control

Guess you like

Origin www.cnblogs.com/learningaccording/p/12736800.html
Recommended