2019-2020-1 semester 20,192,403 "Introduction to cyberspace security professionals," the eighth week of learning summary

2019-2020-1 semester 20,192,403 "Introduction to cyberspace security professionals," the eighth week of learning summary

Chapter One

Learnings

  • Common life cyberspace security issues: account password stolen, credit card theft brush
  • Work in common cyberspace security
    threats faced by network equipment: routers export enterprise network to communicate with the outside world, mastered the router to grasp the right to control the internal network to access the external network.
    OS threats facing: the operating system itself there are loopholes that hackers get permission to use illegal means to the operating system.
    Facing the threat of the application
  • Data security includes: data security, data storage and backup
  • Cyberspace security technology infrastructure: physical security, network security, system security, application security, data security, advanced computing security issues in big data context, public opinion analysis, privacy, cryptography and application, cyberspace combat cyberspace security control
  • Opportunities and challenges facing the security of cyberspace

    Chapter II Physical Security

    Learnings

    Outline

  • Definition: The physical security information system software and hardware equipment, facilities, and other media from natural disasters, man-made damage or operational errors' and various computer crimes lead to the destruction of techniques and methods.
  • Status: is the information system security foundation
  • Scope: environmental security, medium security and safety equipment

    Physical security environment

    Myth clear: physical isolation system does not guarantee one hundred percent security system.
  • Physical locations
    building capacity shock wind and rain, avoiding high or basement walls or the lower water equipment.
    Computer room and computer room disaster recovery to select fewer natural disasters.
  • Physical Access Control
    definitions: control physical protection is provided between sources of information and unauthorized persons protected.
  • Anti-theft and anti-sabotage
    should master device is placed in the machine room;
    should be major components or devices fixed , and provided significant indelibly mark ;
    should be a communication cable laid in the shelter ;
    coping medium classification flag storage;
    Settings theft alarm system ;
    engine room is provided to monitor the alarm system .
  • Lightning
    measures: lightning, to ground, shunt, shielding
    requirements: lightning equipment room mounting means should be provided to prevent lightning lightning protector, the bottom line of the AC power should be set room
  • Fire waterproof
  • Anti-static: the basic principles of "suppress or reduce the generation of static charge, strict control static yuan"
  • Temperature and humidity control: constant temperature and humidity setting system
  • electricity supply
  • Electromagnetic protection
    common form of electromagnetic leakage comprising: a radiation leak, leak conductive
    protective measures: grounding to prevent external electromagnetic interference and parasitic coupling interference associated server, the communication cable and power cable are isolated to avoid interference suppressing electromagnetic emissions (take various measures to reduce the electromagnetic emissions or related circuitry interference) shield isolation

    Physical security equipment

  • Security Hardware
  • Security Chip
    Description: a Trusted Platform Module (the TPM), an independent key generation, encryption and decryption means, independent of the internal processor and the storage unit
    functions can be realized: storing, managing passwords, encryption, the encrypted hard disk partitioning

    The problem to be solved

  1. What is the "ground" (lightning lightning protection system has been incorporated into energy)?
  2. What is relevant server parasitic coupling interference?

Guess you like

Origin www.cnblogs.com/ZhaoqQiuhan/p/11929303.html