2019-2020 semester 20,192,404 "Introduction to cyberspace security professionals," the eighth week of learning summary

Introduction to Cyberspace Security

The first chapter cyberspace security overview

Life and work of network security

The common life of network security issues:
1, the account password stolen
2, credit cards stolen brush

Work in common network security issues:
1, facing the threat of network equipment
2, facing the threat of an operating system
3, application threats

Cyberspace basic understanding
Cybersecurity
cyberspace is now coming with a collection of all information systems, information environment for human survival.

Cyberspace security is to safeguard cyberspace normal order, to avoid information, freedom of speech is abused for personal privacy, social stability, economic development, national security, adverse effects and require measures; is to ensure the security of networks and information systems established and all security measures technical and management levels taken, including avoiding networking hardware, network transmission, software and data due to accidental causes and not malicious and destruction, changes and disclosure, so that the system can continue normal operation while taking technical means of supervision and management measures, as well as constraints on cyberspace all acts likely to endanger others or the national interest, as well as regulatory measures to prevent and stop it.

Cyberspace security technology infrastructure
- physical security
- Network Security
- System security
- application security
- Data security
- advanced computing security issues in large data background
- public opinion analysis
- Privacy
- Cryptography and Applications
~ cyberspace combat
~ cyberspace security governance

Opportunities and challenges of cyberspace faces
both opportunities and challenges
of cyberspace development of major opportunities:
- new channels of information dissemination of
new space - production and life
- new engine of economic development
- new carrier of culture and prosperity
- social governance the new platform
new bond exchanges and cooperation ~
~ frontier of national sovereignty
challenges of cyberspace face:
- network penetration jeopardize political and security
- network attacks threaten economic security
- network harmful information erosion of cultural security
- network of terrorist and criminal damage to society security
international competition network - the ascendant space
- cyberspace opportunities and challenges
**

Chapter II Physical Security

Physical Security Overview
physical definition of security:
physical security information system is to ensure a secure physical environment, a set of perfect technical control measures for human contact, and give full consideration to the threat of natural events on the system and may cause them to circumvent.
Simply put, it is to prevent the techniques and methods of information systems hardware and software facilities from destruction.
Physical Security range:
1, environmentally safe
2, the security device and security medium
physically secure environment
1, physical locations
2, physical access control
3, anti-sabotage and anti-theft
4, lightning
5, fireproof
6, moisture-proof and waterproof
7 , anti-static '
8, temperature and humidity control
9, the power supply
10, an electromagnetic shield
physical security devices
secure hardware:
. 1, the PC network physical security isolation card
2, the network security physical isolation device
3, physical isolation gateway
chip security
**

Chapter VI Data Security

Data Security Summary
data from creation, storage, access, transmission, use to destroy the whole life-cycle management process will encounter the threat.
Data security context of
security elements data:
Data security refers to the legitimate holders and users to protect confidential data can be obtained at any time require the data, pure raw data has not been changed is illegal.
We often Confidentiality, Integrity and Availability of data security as a factor, referred to as CIA.
C: Confidentiality
I: integrity
A: availability of
data security: the
following several aspects
1, the data itself
2, the security of data protection
3, the security of data processing
4, secure data storage
data storage technology
storage medium data:
a magnetic medium
(1) tape
(2) hard
- solid state drive (characteristics: 1. 2. low power reading and writing speed, no noise, anti-vibration, low-calorie, low volume, Extreme operating temperatures)
~ removable hard
~ hybrid hard drive
(3) optical medium
(4) on semiconductor storage
to store program data:

. 1, the DAS:
as with ordinary PC storage architecture, the external storage device directly attached to a server internal bus , data storage device is part of the overall configuration of a server.
Mainly applies to the following environment:
1), a small network
2), geographically dispersed networks
3), application server
vulnerabilities: low efficiency server and the storage structure is connected, it is not convenient for data protection. Direct-attached storage can not be shared.
2, NAS
overcome the inefficiencies of DAS weakness. Independent of the server, the network data is stored separately for the development of a storage device connected to the file server from a network is formed.
Following advantages
1) Plug and Play (independent storage node exists in the network, regardless of the user's operating system platform)
2) Simple storage deployment
3) very flexible storage location
4) low cost and easy to manage
insufficient
storage low performance, high reliability is not
3, SAN
advantages of
the network communication protocol and device to isolate the transmission physical medium, so that multiple protocols may be transmitted simultaneously on the same physical connection.
1) easy network deployment
2) high-speed memory performance
3) Good ability to expand

RAID
是指由独立磁盘构成的具有冗余能力的阵列。
磁盘阵列样式:
1)外接式磁盘阵列柜
2)内接式磁盘阵列卡
3)利用软件仿真的方法
数据存储安全
数据存储安全的定义:
是指数据库在系统运行之外的可读性。
数据存储安全的措施:
首先,确定问题所在
其次,全年全天候对用户的行为进行检测
然后,应根据实际应用需求,严格进行访问控制。
数据备份
是指为防止系统出现操作失误或系统故障导致数据丢失,而将全部或部分数据集合从应用主机的硬盘或阵列复制到其他存储介质的过程。
数据备份的方式:
1、定期进行磁带备份
2、数据库备份
3、网络数据
4、远程镜像
5、正常备份
6、差异备份
7、增量备份
主要备份技术:
1、LAN备份
2、LAN-FREE备份
3、Server-Less备份
数据恢复技术
原理
种类:
1、逻辑故障数据恢复
2、硬件故障数据恢复
3、磁盘阵列RAID数据恢复
常见恢复方法:
1、硬盘数据恢复
2、U盘数据恢复
**

第七章 大数据背景下的先进计算安全问题

大数据安全
定义:

  • 1.定义

    需要新处理模式才能具有更强二点决策力、洞察发现力和流程优化能力来适应海量、高增长率和多样化的信息资产

    2.特点
  • 大容量
  • 多样性
  • 快速度
  • 真实性

    3.分类
  • 个人大数据
  • 企业大数据
  • 政府大数据

    7.1.2大数据的使用价值和思维方式
    1.预测价值
    2.社会价值
    3.思维方式
    7.1.3大数据背景下的安全挑战
    1.大数据增加了隐私泄露的风险
    2.大数据为高级持续性威胁(APT)提供了便利
  • 大数据使APT攻击者收集目标信息和漏洞信息更加便利
  • 大数据使攻击者可以更容易地发起攻击
  • 大数据下访问控制难度加大
    • 难以预知角色,实现角色划分
    • 难以预知每个角色的实际权限
  • 大数据下审计工作难度加大

    第九章 隐私保护

    9.1网络空间安全领域隐私的定义

  • 个人身份数据
  • 网络活动数据
  • 位置数据

    9.2隐私泄漏的危害

  • 个人信息泄露,冒充机关诈骗
  • 购物信息泄露,冒充卖家诈骗
  • 通信方式泄露,遭遇中奖诈骗
  • 寻求工作信息泄露,虚假招聘信息
  • 家庭信息泄露,绑架诈骗

    9.3个人用户的隐私保护

    9.3.1隐私信息面临的威胁
  • 通过用户账号窃取隐私
  • 通过诱导输入搜集隐私
  • 通过终端设备提取隐私
  • 通过黑客攻击获得隐私

    - 9.3.2隐私保护方法
  • 加强隐私保护意识
  • 提高账户信息保护能力
  • 了解常见的隐私窃取手段,掌握防御方法

    9.4数据挖掘领域的隐私保护

    1.分类
  • 原始记录中含有私密信息
  • 原始记录中含有敏感知识

    2.实现方式
  • 基于数据失真的技术
  • 基于数据加密的技术
  • 基于限制发布的技术

    9.4.1基于数据失真的技术
  • 扰动原始数据
  • 攻击者不能发现真实的原始数据
  • 失真后的数据仍然保持某些性质不变

    9.4.2基于数据加密的技术
  • 分布式应用环境
  • 安全多方计算(SMC)
  • 分布式匿名化

    9.4.3基于限制发布的技术
  • 去标识
  • 数据泛化
  • 数据抑制
  • 子抽样
  • 插入噪声
  • 分解

    9.5云计算领域中的隐私保护

  • 数据生成阶段
  • 数据传输阶段
  • 数据使用阶段
  • 数据共享阶段
  • 数据存储阶段
  • 数据归档阶段
  • 数据销毁阶段

    9.6 物联网领域中的隐私保护

  • 基于位置的隐私威胁
  • 基于数据的隐私威胁

    9.6.1 物联网位置隐私的保护方法
  • 基于启发式隐私度量的位置服务隐私保护技术
  • 基于概率推测的位置服务隐私保护技术
  • 基于隐私信息检索的位置服务隐私保护技术

    9.6.2物联网数据隐私保护方法
  • 匿名化方法
  • 加密方法
  • 路由协议方法

    9.7区块链领域中的隐私保护

  • 去中心化
  • 健壮性
  • 透明性

    9.7.1区块链隐私保护需求
  • 不允许非信任节点获得区块链交易信息
  • 允许非信任节点获得交易信息,但是不能将交易和用户身份联系起来
  • 允许非信任节点获得交易信息,并参与验证工作,但是不知道交易细节

    9.7.2区块链隐私保护技术
  • 采用访问控制策略对区块链中的节点进行授权控制(降低公信力,应用于私有链或联盟链)
  • 每一次操作设置一次性账号,将交易信息分散到不同账号,采用CoinJion等混币策略
  • 复杂密码学技术,例如,基于区块链技术的新型数字货币Zcash采用零知识证明技术实现这种需求

Guess you like

Origin www.cnblogs.com/jzbysl0910/p/11938416.html