Traditional Culture Encyclopedia - Traditional culture - What does network security do?
What does network security do?
Network security is to take necessary measures to prevent attacks, intrusions, interference, destruction, illegal use and accidents on the network, make the network in a stable and reliable state, and ensure the integrity, confidentiality and availability of network data.
Network security has different interpretations in different application environments. For an operating system in the network, network security refers to the security of information processing and transmission. Including the safe and reliable operation of hardware system, the safety of operating system and application software, the safety of database system and the protection of electromagnetic information leakage. Network security in a narrow sense mainly focuses on the security of network transmission.
The fundamental purpose of computer network is to enjoy resources, and communication network is the way to realize network resources. Therefore, the computer network is secure, and the corresponding computer communication network must also be secure. It should be able to exchange information and enjoy resources for network users.
Main problems faced by network security
1, Internet is an open network with no control mechanism. Hackers often invade the computer system in the network, or steal confidential data and privileges, or destroy important data, or make the system function not fully play until paralysis.
2. Internet data transmission is based on TCP/IP communication protocol, which lacks security measures to prevent information from being stolen during transmission.
3. Most communication services on the Internet are supported by Unix operating system, and obvious security vulnerabilities in Unix operating system will directly affect security services.
4. Electronic information stored, transmitted and processed on the computer is not envelope protected, signed and stamped like traditional mail communication. Whether the source and destination of information are true, whether the content has been changed, whether it has been leaked, etc. , maintained by the gentleman's agreement in the service agreement supported by the application layer.
E-mail may be read, typed incorrectly and forged. It is very dangerous to use e-mail to transmit important confidential information.
- Previous article:Introduction to traditional festivals.
- Next article:Which U.S. cities are considered food deserts?
- Related articles
- The five elements of traditional printing are the original, ink, substrate and what
- What are the special snacks in Changchun?
- What is the treatment for lumbar disc herniation?
- The Combination of Science and China Tradition
- How to better inherit and develop Anhui traditional culture in today's era?
- Hand Embroidery Introduction English Essay
- What are the top ten brands of wooden doors in China?
- Digil fingerprint lock price
- What is the right tuning for a slip drift rod
- Translate, master, translate into English, thank you.