2019-2020-1 semester 20,192,420 "Introduction to cyberspace security professionals," the eighth week of learning summary

2019-2020-1 semester 20,192,420 "Cyberspace Security Introduction" eighth week of the study summary (Introduction to security in cyberspace)


Harvest of learning

  • In Chapter 1, Cyberspace Security Overview of the learning process, I first learned we face in real life network security issues , the book also provides detailed examples we cited allow us to more clearly recognize the problem. Next, the book was given a cyberspace security implications, the industry understood the technical architecture of cyberspace security . In the last chapter, the book also secure our cyberspace facing opportunities and challenges are analyzed.

  • In Chapter 2, the physical security of the learning process, I first learned in detail the concept of physical security , but also on the physical location of choice, physical access control, lightning protection and other safety measures were explained, then, the book also introduced us the common physical security hardware and security hardware . At the end of the book, the book also introduced us to chip security of the main research topics.

  • In Chapter 6, the data security of the learning process, I first learned about data security concepts and three security elements (CIA) . Next, the book also introduced us to the knowledge and data storage security of confidential data definitions, and measures to ensure the core of the common mode data stored profound explain to us, then, I also understand the data backup technology , RAID data recovery techniques and technology, so that we understand the complete data storage and backup technology.

  • In Chapter 9 Privacy learning process, I first learned the definition of the security realm of privacy in cyberspace , then book also tells us the harm of privacy, it allows us to have a better understanding. Then, the book introduced us to individual users of privacy threats and privacy protection methods. At the end of this chapter, I realized that the field of data mining and cloud computing, as well as knowledge of things and privacy protection in the field of the block chain .


Learning problems and major settlement process

  • Hackers captured the router, mastered the net to visit outside the network within the control of power, but a firewall is established between the internal network and external network, in which it has no role to play, or directly been cracked by hackers?
  • In asymmetric encryption, why use private key encryption, public key decryption operations to non-repudiation?
  • What is the error checking bits?
  • What is saved by cluster?
  • Different ways of data storage What's the difference?
  • What is characteristic of multi-tenant cloud environments?
  • Resolution process: mainly by our group to discuss and exchange, repeatedly try to figure out where a certain amount of sense, and really do not know to go to the teacher, and constantly improve their knowledge and understanding.

Guess you like

Origin www.cnblogs.com/rwl010306/p/11936923.html