2019-2020-1 semester 20,192,408 "Introduction to cyberspace security professionals," the eighth week of learning summary

Chapter 1 Cyberspace Security Overview

1.1 network security work and life

Common network security issues 1.1.1 life

  1. Account password stolen
  2. Credit card stolen brush
  3. In addition to online fraud and phishing sites and other kinds of cyberspace security incidents

    Common network security issues 1.1.2 Work

    1. Threats faced by network equipment
  • 2. The threat faced by the operating system
  • 3. Application of threats facing
  • Run a large number of applications on your computer, work safety and enterprise users and applications are closely related.

    1.2 cyberspace a basic understanding of security

  • We often say that cyberspace is to describe the information or the information space environment for human survival and create words.
  • Cyberspace is now with the collection of all information systems of the future, is the interaction between the information environment of human existence, people and network environment, the increasingly close interaction.

    1.3 cyberspace security technology architecture

  • Physical Security: Concepts, physical environment, safety and physical security physical security equipment.
  • Network security: network and security protocols, network security and management, to identify and respond to cyber security risks.
  • System Security: Operating system security, virtualization, security and mobile terminal security.
  • Application Security: malicious code, database security, middleware, security, and Web security.
  • Data security: data security category, data confidentiality, data storage technologies and data backup and recovery technology.
  • Advanced computing security issues in the context of big data: Big Data security, cloud security and safety of things.
  • Public opinion analysis: the concept of public opinion, public opinion of network analysis methods both public opinion analysis application technology.
  • Privacy: individual user's privacy protection, privacy protection of data mining, cloud and privacy protection and privacy protection field block chain art things.
  • Cryptography and applications: cryptographic algorithm, public key infrastructure, virtual private network and privilege management infrastructure.
  • Cyberspace combat: social engineering and cyberspace actual cases and so on.
  • Cyberspace security governance: information security regulations and policies, information security standards and corporate security stress testing and implementation methods.

    1.4 opportunities and challenges facing the security of cyberspace

    1.4.1 significant development opportunities for security of cyberspace

  • New channels of information dissemination.
  • Production of new living space.
  • The new engine of economic development.
  • The new carrier cultural prosperity.
  • The new platform social governance.
  • Exchange of new ties of cooperation.
  • National sovereignty frontier.

    1.4.2 The challenges facing the security of cyberspace

  • Internet penetration endanger political security.
  • Network attacks threaten economic security.
  • Harmful Information erosion of cultural security.
  • Terrorist and criminal networks undermine Social Security.
  • ICN space in the ascendant.
  • Cyberspace opportunities and challenges, we must adhere to active use, scientific development, principles of management according to law, safeguard cyberspace security.

    Chapter 2 Physical Security

    2.1 Physical Security Overview

    Physical security is defined

  • To ensure that information systems have a safe physical environment
  • Personnel access to information technology has a comprehensive system of control measures
  • Give full consideration to the threat of natural events on the system and may cause them to avoid the

    Physical security range

  • environment safety
  • Safety and security equipment Media

    2.2 Physical security environment

    1. physical locations

  • Room and office space should be placed in a building with shock, wind and rain proof

    2. Physical Access Control

  • Physical protection means disposed between the source of unauthorized persons and control information protected

    3. Anti-theft and anti-sabotage

    4. lightning

  • Lightning diverter ground shield

    5. Fire

  • Eliminate fire hazards
  • Setting fire alarm system
  • Fire fighting equipment configuration
  • Strengthen fire prevention and management practices

    6. The waterproof and moisture-proof

    7. Anti-static

    8. A temperature and humidity control

    9. Power Supply

    10. The electromagnetic protection

    2.3 Physical Security Equipment

    2.3.1 Security Hardware

  1. PC network physical security isolation card
  2. Physical Security Isolator
  3. Physical isolation network gateway

    2.3.2 chip security

  • In fact, the security chip can be described as a Trusted Platform Module (the TPM), which is an independent key generation, encryption and decryption means, independent of the internal processor and the storage unit may store the key features and data, the computer provide encryption and secure authentication services.

    Security chip with proprietary software can perform the following functions

  1. Storage, password management functions
  2. encryption
  3. Encrypted partition the hard drive

    Chapter 6 Data Security

  • The main cause of data breaches include: cyber attacks by hackers, Trojans, viruses, theft, lost or stolen, improper use and management.

    6.2 Data Security category

    6.2.1 Data Security elements

  • Data security is the legitimate holders and users to protect confidential data can be obtained at any time require the data has not been changed illegally genuine data
  • Confidentiality: data refers to a certain degree of confidentiality can only let people have the right to read or change the read and change
  • Integrity: means during storage or transmission, the original data can not be arbitrarily changed
  • Availability: At any time the rightful owner of the data can get data

    6.2.2 Data Security composition

  1. The data itself: mainly refers to the use of modern cryptographic algorithms for data protection initiative, such as data confidentiality, data integrity, strong authentication and other two-way
  2. Data protection security: mainly refers to the use of modern means of information stored in the data active protection
  3. Safety Data processing: refers to how effectively prevent data entry, processing, statistical or printing because the database Soviet anger to love or data loss due to hardware failure phenomenon
  4. Data storage security

    6.3 Data confidentiality

    6.3.1 Data Encryption

    Specific encryption

  • Symmetric encryption: refers to the encryption and decryption using the same key, fast, but pay particular attention to key storage. Commonly used DES, 3DES, AES, IDEA, etc.
  • Asymmetric encryption: YES public and private RSA and DSA
  • Hash algorithms: one-way hash algorithm, only from one state to another state and irreversible

    6.3.2 DLP

  • Data Loss Prevention, is reached through prevention and control of content identification data.
  • The range includes the prevention and control network protection and protection terminal
  • Mainly audit network protection, control-oriented, in addition to the terminal protective auditing and control, the host should comprise conventional control, access control and encryption capabilities
  • The results ultimately found a smart, intelligent encryption, intelligent control, intelligent audit

    6.4 Data Storage Technology

    6.4.1 Data storage medium

    Magnetic Media

  1. Tape Drives
  2. hard disk

    SSD
  • Solid state electronic storage is a hard disk array chip made by the control unit and the storage unit
  • Features are: 1 read and write speed 2. The low power consumption, noise, anti-vibration, low-calorie, small size, wide operating temperature range

    Replaceable hard disk
  • Including a hard disk and 3.5 inch 2.5 inch desktop hard drive

    Hybrid hard drive
  • The magnetic hard disc and a flash memory integrated together for a hard disk, like a mechanical hard drive SSD +
  1. Optical Media
  2. The semiconductor memory

    Data storage scheme 6.4.2

  • The so-called storage solution, is to use separate hardware and software disk / disk group to manage for the PC
  • The server type, can be divided into a closed storage system (mainly mainframe storage) and open system storage
  • Open storage system is divided into built-in memory and attached storage current plug-in storage solutions are mainly divided into three types:
  1. Direct-attached storage
  2. Network Attached Storage
  3. Storage Area Network

    THE

    Mainly applies to the following environment:
  4. Small networks
  5. Geographically dispersed network
  6. Special application server
  • Weakness is inefficient and inconvenient for data protection

    NAS

  • Independent of the server, the network data is stored separately for the development of a storage device connected to the file server, a network itself into
  • Suitable for file storage, not suitable for database applications
  • Following advantages:
  • 1, true plug and play
  • 2. Simple storage deployment
  • 3. Storage device location is very flexible
  • 4. Low cost and easy to manage
  • Disadvantages: lower storage performance and reliability is not high

    SAN

  • SAN hardware infrastructure Fiber Channel consists of three parts
  • 1. The apparatus comprises a storage and backup tapes, hard disks and optical disk libraries
  • 2. Fiber Channel network connection member
  • 3. The application and management software
  • Following advantages:
  • Easy network deployment
  • High-speed storage performance
  • Good scalability

    RAID technology

  • It refers to an array having redundancy composed of independent disks
  • Parity check
  • External disk array cabinets
  • Disk array card inscribed
  • Defined by software emulation

    6.5 Data Storage Security

    6.5.1 definitions

  • Data storage security is the database system is running out of readability
  • Intrinsically safe is to achieve a balance aspects: the cost of security measures, the impact of security breaches and the intruders to break through security measures how much resources

    6.5.2 Data storage security measures

  • Identify the problem
  • Year-round all-weather detection of the user's behavior
  • It should be based on application requirements, strict access control

    6.6 Data Backup

    6.6.1 The concept of data backup

  • Data backup is operational errors or system failure of the system to prevent loss of data, and all or part of the set of copy data from the host application to the hard disk array or other storage medium during
  • Network backup is typically done in conjunction with appropriate hardware and data storage devices specialized storage management software.

    6.6.2 Data backup mode

  1. Regular tape backup
  2. database backup
  3. Network Data
  4. Remote mirroring
  5. A normal backup
  6. Differential backup
  7. Incremental Backup

    6.6.3 The main backup technology

  8. LAN backup
  9. LAN-Free backup
  10. Serber-Less backup

    6.7 Data Recovery Technology

  • Data recovery is through technical means, saved on a computer hard drive is lost, the server hard drive, tape library storage, removable hard disk, U disk rescue devices such as data reduction techniques and

    6.7.2 types of data recovery

  1. Logical failure data recovery
  2. Data recovery hardware failure
  3. RAID data recovery RAIO

    Data recovery method common devices 6.7.3

  4. Hard drive data recovery
  5. U disk data recovery

    Chapter 9 Privacy

    The field of security in cyberspace definition of privacy 9.1

  • Personally identifiable data
  • Network activity data
  • Location data

    9.2 loss of privacy hazards

  • To bring troubled personal life
  • Upgraded to illegal violations against individuals, such as fraud and malicious ads
  • It can lead to more serious criminal activities such as money laundering
  • Disclosure of private data will also become the material of hacker attacks

    9.3 Individual user privacy

    9.3.1 faced the threat of private information

  1. User privacy by stealing account
  2. Privacy by inducing collect input
  3. Extracting the terminal device privacy
  4. Get privacy by hackers

    9.3.2 Privacy protection methods

  5. Strengthen privacy protection awareness
  6. Improve the ability to protect account information
  7. Learn about common methods of identity theft, master defensive approach
  • (1) collect the target user's personal information
  • (2) For the case of a password difficult to guess, hackers can use social library information query publicly available online account password
  • (3) find the user password later, the hacker can log related sites

    Privacy 9.4 data mining

    In the field of data mining, privacy information is divided into two categories

  • (1) contained in the original recording of private information
  • (2) the original records containing sensitive knowledge

    Based on different data processing algorithms, data mining privacy have different implementations, it can be divided into three categories

  • (1) based on data distortion in the art
  • (2) based on data encryption techniques
  • (3) restrictions on publishing technology

    2. Based on the data encryption techniques

  • Used for distributed application environment, data is stored in two modes: vertical division and a horizontal division of the data pattern of data patterns

    3. Based on the technical limitations of release

    In order to achieve privacy protection means are selectively released part of the original data, the data is not released or released lower precision data.
  • To identify
  • Data generalization
  • Data suppression
  • Sub-sampling
  • Insert noise
  • break down

    9.5. Cloud computing in the field of privacy protection

    Data generation stage: for an owner information data processing
    data transfer phase: in a cloud computing environment, comprising transmission between the transmission and the internal server servers of different enterprises
  • Data use phase
  • Data sharing stage
  • Data storage stage
  • Data archiving stage
  • Data Destruction stage

Privacy 9.6. In the field of things

  • Location-based privacy threats
  • Based on data privacy threats

1. Location privacy protection method of Things

  • Based on heuristic technology to protect the privacy of the location server metrics
  • Location-based services privacy protection technology probability of speculation
  • Location-based services privacy protection of privacy of information retrieval technology

2. The method of Things data privacy protection

  • Anonymous methods
  • Encryption method
  • Routing Protocol Method

9.7. Block chain in the field of privacy protection

1. block chain needs privacy protection

  • Not allowed to get un-trusted node block chain transaction information
  • Allow non-trusted node to obtain transaction information, but can not be linked to the transaction and the identity of the user
  • Allow non-trusted node to obtain transaction information, and participate in verification, but do not know the details of the transaction

2. block chain privacy protection technology

The first demand, the need for external verification and maintenance of block chain node involvement, borne entirely by the corresponding work within the enterprise server trusted.
The second demand is to ensure that the core of the transaction and the identity of the user is not linked.
The third demand requires both un-trusted node to complete the transaction validation, but also to ensure that non-trusted node can not obtain details of the transaction.

  • Advanced computing security issues under Chapter 7 of large data background

    7.1 Big Data security

    7.1.1 The concept of Big Data

    1. The definition of large data

  • To one kind of large-scale far beyond the acquisition, storage, management, analysis of the data collection capabilities of the traditional tools of database software, with vast amounts of data size, fast data transfer, a variety of data types and values ​​of the four low-density characteristics.

    2. The characteristics of Big Data

  1. Large capacity
  2. Diversity
  3. fast speed
  4. Truth

    Classification 3. Big Data

  5. Big personal data
  6. Enterprise Big Data
  7. Government Big Data

    Way of thinking and the use value of big data 7.1.2

  8. Predictive Value of Big Data
  • Fi brings real-time data exchange prompted analyze massive amounts of data to find relevant, support judgment, gain insight
  1. Social Value of Big Data
  2. Thinking big data
  • Mode and route data collection more and more, increasingly rich and diverse content and type
  • Data analysis not the only micro-sampling, but also have full access to the whole of the macro data
  • From the pursuit of things simple linear causal relationship between the development of rich steering linkages relationship

    7.1.3 security challenges in the context of big data

    1. Big data increases the risk of loss of privacy
  • 2. Large data for advanced persistent threat (APT) has facilitated
  • APT is a form of attack for long-term, sustained cyber attacks on specific targets using advanced means of attack
  • (1) Big data enables APT attackers collect target information and vulnerability information more convenient
  • (2) large data allow an attacker to more easily attack
  • (3) access control more difficult large data
  • a. default role is difficult to achieve separation of roles
  • b. it is difficult to predict the actual permissions for each role
  • 4. Large data under audit work more difficult
  • From the data itself brings big risk, the current main consideration two aspects
  • Security (1) big data infrastructure
  • (2) data own security

Guess you like

Origin www.cnblogs.com/HuYiL/p/11939392.html