2019-2020-1 semester 20,192,403 "Introduction to cyberspace security professionals," the eighth week of learning summary
Chapter One
Learnings
- Common life cyberspace security issues: account password stolen, credit card theft brush
- Work in common cyberspace security
threats faced by network equipment: routers export enterprise network to communicate with the outside world, mastered the router to grasp the right to control the internal network to access the external network.
OS threats facing: the operating system itself there are loopholes that hackers get permission to use illegal means to the operating system.
Facing the threat of the application - Data security includes: data security, data storage and backup
- Cyberspace security technology infrastructure: physical security, network security, system security, application security, data security, advanced computing security issues in big data context, public opinion analysis, privacy, cryptography and application, cyberspace combat cyberspace security control
Opportunities and challenges facing the security of cyberspace
Chapter II Physical Security
Learnings
Outline
- Definition: The physical security information system software and hardware equipment, facilities, and other media from natural disasters, man-made damage or operational errors' and various computer crimes lead to the destruction of techniques and methods.
- Status: is the information system security foundation
Scope: environmental security, medium security and safety equipment
Physical security environment
Myth clear: physical isolation system does not guarantee one hundred percent security system.- Physical locations
building capacity shock wind and rain, avoiding high or basement walls or the lower water equipment.
Computer room and computer room disaster recovery to select fewer natural disasters. - Physical Access Control
definitions: control physical protection is provided between sources of information and unauthorized persons protected. - Anti-theft and anti-sabotage
should master device is placed in the machine room;
should be major components or devices fixed , and provided significant indelibly mark ;
should be a communication cable laid in the shelter ;
coping medium classification flag storage;
Settings theft alarm system ;
engine room is provided to monitor the alarm system . - Lightning
measures: lightning, to ground, shunt, shielding
requirements: lightning equipment room mounting means should be provided to prevent lightning lightning protector, the bottom line of the AC power should be set room - Fire waterproof
- Anti-static: the basic principles of "suppress or reduce the generation of static charge, strict control static yuan"
- Temperature and humidity control: constant temperature and humidity setting system
- electricity supply
Electromagnetic protection
common form of electromagnetic leakage comprising: a radiation leak, leak conductive
protective measures: grounding to prevent external electromagnetic interference and parasitic coupling interference associated server, the communication cable and power cable are isolated to avoid interference suppressing electromagnetic emissions (take various measures to reduce the electromagnetic emissions or related circuitry interference) shield isolationPhysical security equipment
- Security Hardware
Security Chip
Description: a Trusted Platform Module (the TPM), an independent key generation, encryption and decryption means, independent of the internal processor and the storage unit
functions can be realized: storing, managing passwords, encryption, the encrypted hard disk partitioningThe problem to be solved
- What is the "ground" (lightning lightning protection system has been incorporated into energy)?
- What is relevant server parasitic coupling interference?