Cybersecurity The Past Life of Cybersecurity

      To talk about network security, we must first clarify and define the precise definition or scope of network security. This really isn't an easy job. It's not a simple job, let's start with a simpler job - the past life of network security.

      At the beginning of the network's birth, the design goal of network developers/designers was very simple, that is, to transmit data from point A to point B through a computer.

      As far as the application of the network is concerned, it has gone through several stages:

      1) Laboratory stage

       The development and forming stage of basic network technology.

      2) The use stage of the US military

       3) The commercial application stage of the network.

      In the stages 1) and 2) of network applications, there is also a way of talking about network security, but that is the connotation of network security, which is completely different from the network security under the background of massive civilian network applications today.

        The network security we are talking about today is in the 3) stage. With the increasing number of commercial applications of the network, these commercial applications are more and more closely related to people's wealth, whether directly or indirectly. The situation of network security has become more and more severe.

        Take QQ, which is in full swing today, as an example. The early QQ was a chat tool, and this chat tool basically did not come with any economic benefits for users. No one would worry about QQ account being stolen. In addition to being a chat tool, some users use QQ as a show-off tool and a competition tool to show off their fast typing speed and compete for typing speed, and that's it. At that time, it was not common for QQ numbers to be stolen, but it was common for QQ numbers to be lost due to forgotten passwords. At that time, if someone talked to Mr. Ma Huateng about how to ensure the network security of QQ, he would have to win at least a strange look, and it would be normal to win the evaluation of "neuropathy" behind Mr. Ma Huateng.

        From the above brief review, so far, we can basically get a basic feature of network security: the severity of network security is positively related to the economic benefits of network applications. The greater the economic benefits associated with network applications, the more severe the network security situation will be.

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=325949785&siteId=291194637
Recommended