Home > Common Problem > body text

What can be summarized as what computer network security involves?

青灯夜游
Release: 2020-12-01 17:10:35
Original
9541 people have browsed it

The content involved in computer network security can be summarized as three aspects: advanced technology, strict management and majestic laws. Computer network security refers to the use of network management controls and technical measures to ensure that the confidentiality, integrity and availability of data are protected in a network environment.

What can be summarized as what computer network security involves?

The content involved in computer network security can be summarized as three aspects: advanced technology, strict management and majestic laws.

Computer network security refers to the use of network management controls and technical measures to ensure that the confidentiality, integrity and availability of data are protected in a network environment. Computer network security includes two aspects, namely physical security and logical security. Physical security means that system equipment and related facilities are physically protected from damage, loss, etc. Logical security includes information integrity, confidentiality, and availability.

Technical level

For the technical aspect, computer network security technology mainly includes real-time scanning technology, real-time monitoring technology, firewall, integrity inspection and protection technology, and virus situation analysis report Technology and system security management techniques. Taken together, the following countermeasures can be taken at the technical level:

1) Establish a safety management system. Improve the technical quality and professional ethics of personnel, including system administrators and users. For important departments and information, it is a simple and effective method to strictly perform virus checks on startup and back up data in a timely manner.

2) Network access control. Access control is the main strategy for network security prevention and protection. Its main task is to ensure that network resources are not illegally used and accessed. It is one of the most important core strategies to ensure network security. Access control involves a wide range of technologies, including network access control, network permission control, directory-level control, attribute control and other means.

3) Database backup and recovery. Database backup and recovery are important operations for database administrators to maintain data security and integrity. Backups are the easiest and most accident-proof way to restore a database. Recovery is the operation of using backups to restore data after an accident has occurred. There are three main backup strategies: backing up the database only, backing up the database and transaction log, and incremental backup.

4) Apply cryptographic techniques. The application of cryptographic technology is the core technology of information security, and cryptographic means provide a reliable guarantee for information security. Password-based digital signatures and identity authentication are currently one of the most important methods to ensure information integrity. Cryptographic technologies mainly include classical cryptography, single-key cryptography, public-key cryptography, digital signatures, and key management.

5) Cut off transmission channels. Thoroughly disinfect infected hard drives and computers, do not use U disks and programs of unknown origin, and do not download suspicious information from the Internet at will.

6) Improve network anti-virus technical capabilities. Perform real-time filtering by installing a virus firewall. Conduct frequent scanning and monitoring of files in network servers, use anti-virus cards on workstations, and strengthen network directory and file access permission settings. In a network, restrict the files that are allowed to be executed only by the server.

7) Develop and improve a highly secure operating system. It is safer to develop an operating system with high security and not provide a breeding ground for viruses.

Management level

The security management of computer networks depends not only on the security technologies and preventive measures adopted, but also on the management measures and execution of computer The strength of safety protection laws and regulations. Only by closely combining the two can computer network security be truly effective.

The security management of computer networks includes security education for computer users, establishing corresponding security management institutions, constantly improving and strengthening computer management functions, and strengthening computer and network legislation and law enforcement. Strengthening computer security management, strengthening users' laws, regulations and moral concepts, and improving computer users' security awareness are very important measures to prevent computer crimes, resist hacker attacks, and prevent computer virus interference.

This requires continuous legal education for computer users, including computer security law, computer crime law, confidentiality law, data protection law, etc., to clarify the rights and obligations that computer users and system managers should perform, and to consciously abide by them. The principles of legal information systems, legal users, information disclosure, information utilization and resource restriction are to consciously fight against all illegal and criminal activities, maintain the security of computers and network systems, and maintain the security of information systems. In addition, computer users and all staff should also be educated to consciously abide by all rules and regulations established to maintain system security, including personnel management systems, operation maintenance and management systems, computer processing control and management systems, and various Information management system, computer room security management system, dedicated aircraft and strict division of labor and other management systems.

Physical security level

To ensure the safety and reliability of computer network systems, it is necessary to ensure that system entities have safe physical environment conditions. This safe environment refers to the computer room and its facilities, which mainly include the following:

1) Environmental conditions of the computer system. The safe environmental conditions of computer systems, including temperature, humidity, air cleanliness, corrosion, insect damage, vibration and shock, electrical interference, etc., must have specific requirements and strict standards.

2) Selection of computer room site environment. It is very important to choose a suitable installation location for your computer system. It directly affects the security and reliability of the system. When choosing a computer room site, pay attention to its external environmental safety, geological reliability, site resistance to electromagnetic interference, avoid strong vibration sources and strong noise sources, and avoid being located on the lower floors or next door to high-rise buildings and water-using equipment. Also pay attention to the management of entrances and exits.

3) Security protection of computer room. The security protection of the computer room is the security measures and countermeasures taken against physical disasters in the environment and to prevent unauthorized individuals or groups from destroying, tampering with or stealing network facilities and important data. In order to achieve regional security, first of all, physical access control should be considered to identify the identity of access users and verify their legality; secondly, visitors must limit their scope of activities; thirdly, the peripherals of computer system center equipment must be Multi-layer security protection circle to prevent illegal violent intrusion; the building where the fourth equipment is located should have facilities to withstand various natural disasters.

Computer network security is a complex system engineering involving many factors such as technology, equipment, management and system. The formulation of security solutions needs to be grasped as a whole. Network security solutions integrate various computer network information system security technologies, integrating secure operating system technology, firewall technology, virus protection technology, intrusion detection technology, security scanning technology, etc., to form a complete and coordinated network security Protection system. We must pay equal attention to management and technology. Security technology must be combined with security measures, strengthen computer legislation and law enforcement, establish backup and recovery mechanisms, and formulate corresponding security standards. In addition, since computer viruses, computer crimes and other technologies do not respect national boundaries, sufficient international cooperation must be carried out to jointly deal with the increasingly rampant computer crimes and computer viruses.

The above is the detailed content of What can be summarized as what computer network security involves?. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template
About us Disclaimer Sitemap
php.cn:Public welfare online PHP training,Help PHP learners grow quickly!