Traditional Culture Encyclopedia - Traditional customs - Personal network information security protection measures

Personal network information security protection measures

1. Personal Network Information Security Tips (General Knowledge of Network Security for Elementary School Students)

Personal Network Information Security Tips (General Knowledge of Network Security for Elementary School Students)

Many people love the Internet, but online gaming is a fascination. Some people are addicted to the game after the game, day and night, and some even play the eyes blind. So I want to remind you to play less games online, otherwise you will lose yourself and fall into the online game can not be extricated.

There are a lot of online games are cheating. For example: online gun games although you can make you can be in it, intense war scenes, shocking sound makes you feel scared, whenever you hit the enemy will be excited, will win some points, you can let you buy more, more advanced weapons, these constantly *** you, tempting you, and so you win more points, the more lucrative prizes, so the player will be desperate to spend time, spend money to play the game. But the result? The pursuit of points but never stop, so not only to make their own bodies were seriously hurt, but also will play home | "lost money", "nothing", more serious: your studies have been greatly affected by the idea of not seeking progress! The only thing you know how to do is to play games. Parents prohibit children from playing games, but parents can not imagine is that the child will sneak to the Internet cafe to continue to play games, play no money, the idea of getting money, and even go to steal, go to cheat ...... At this time, the idea has been completely sailing in the wrong direction, after growing up, you will be regretted for this all your life!

A college student in a college in Chengdu, there is such a work and rest schedule: 13:00, get up, eat lunch; 14:00, go to the Internet cafe to play online games; 17:00, dinner in the Internet cafe takeout; overnight practice, the next morning 9:00 back to the dormitory to rest ......

The college student Almost all of his free time was spent playing games, and he began to refuse to participate in class reunions and activities. About two months later, he found that his thinking could not keep up with the rhythm of his classmates, his mind was thinking about what happened in the game, and when he encountered things, he would first use the rules of the game to consider. He began to feel uncomfortable with real life and fell into a deep anxiety.

At present, there are many Chinese young people like this college student, after a long time addicted to online games, found themselves physically and mentally this or that problem. According to statistics, the number of online game players in China has reached 7 to 10 million, and a significant portion of them are young people around 20 years old.

2. What are the basics of learning network security

Basic knowledge of network security What is network security? Network security refers to the network system hardware, software and data in the system is protected from damage, alteration, leakage due to accidental or malicious reasons, the system can be continuously and reliably normal operation, network services are not interrupted.

What is a computer virus? A computer virus is a set of computer instructions or program code inserted into a computer program by the compiler that destroys computer functions or data, affects the use of the computer, and is capable of self-replication. What is a Trojan horse? A Trojan horse is a type of remote control software that is malicious in nature.

Trojans are generally categorized as client-side and server-side. Client-side is a console for various commands used locally, and server-side is meant to be run by others, and only the computer that has run the server-side can be fully controlled.

The Trojan does not infect files like a virus. What is a firewall? How does it ensure network security? Using a functional firewall is one way to secure your network.

A firewall is a combination of components set up between different networks (such as a trusted corporate intranet and an untrusted public **** network) or network security domains. It is a different network or network security domains between the only entrance and exit of information, according to the enterprise's security policy to control (allow, deny, monitor) the flow of information in and out of the network, and itself has a strong resistance to attack.

It is the infrastructure that provides information security services and enables network and information security. What is a backdoor? Why do backdoors exist? A backdoor is a method of gaining access to a program or system by bypassing security controls.

During the development phase of software, programmers often create backdoors within the software so that they can modify flaws in the program. If the backdoor becomes known to others, or is not removed before the software is released, it becomes a security risk.

What does intrusion detection mean? Intrusion detection is a logical complement to firewalls to help systems deal with network attacks, extend the security management capabilities of system administrators (including security auditing, monitoring, attack identification and response), and improve the integrity of the information security infrastructure. It collects information from a number of critical points in a computer network system and analyzes that information to examine the network for violations of security policies and signs of attack.

What does packet monitoring mean? What does it do? Packet monitoring can be thought of as the computer network equivalent of a tapped phone line. When someone is "listening" to a network, they are actually reading and interpreting the packets being sent over the network.

If you need to send an email or request a web page from a computer on the Internet, the computers you pass through while transmitting the information will be able to see the data you are sending, and packet-monitoring tools allow someone to intercept the data and view it. What is NIDS? NIDS stands for Network Intrusion Detection System and is used to detect hacker and cracker intrusions over the network.

NIDS operates in two ways, either on the target host to monitor its own communications, or on a separate machine to monitor the communications of all network devices, such as HUBs and routers. What is meant by SYN packet? The first packet of a TCP connection, a very small packet.

A SYN attack consists of a large number of these packets, which cannot be processed effectively because they appear to come from sites that do not actually exist. What does encryption mean? Encryption is the most commonly used means of security and confidentiality, utilizing technology to transmit important data in scrambled (encrypted) form, and then restore (decrypt) it by the same or different means once it reaches its destination.

Encryption technology consists of two elements: the algorithm and the key. The algorithm is the step of combining an ordinary or understandable message with a string of numbers (the key) to produce an incomprehensible ciphertext, and the key is an algorithm used to encode and decrypt data.

In security and confidentiality, information communication on a network can be secured by appropriate key encryption techniques and management mechanisms. What is meant by a worm? A worm originates from a virus that spreads over a network.

In 1988, 22-year-old Cornell University graduate student Robert. Robert Morris, a 22-year-old graduate student at Cornell University, sent a virus called "Worm" over the Internet specifically designed to attack UNIX system flaws, the worm caused 6,000 systems to be paralyzed, with an estimated loss of 2 million to 60 million U.S. dollars. As a result of this worm, a computer emergency response team was formed on the Internet.

Now the family of worms has grown to thousands, and most of these millions of worms come from hackers. What is an operating system virus? It is a virus that joins the operating system with its own program to do its work and is so destructive that it can paralyze the entire system.

And because it infects the operating system, the virus replaces legitimate operating system modules with pieces of its own program at runtime. Depending on the characteristics of the virus itself and the status and role of the legitimate program modules of the replaced operating system running in the operating system, as well as the replacement method of the virus replacing the operating system, etc., the operating system will be destroyed.

At the same time, this virus is highly infectious to the files in the system. What does the Morris worm refer to? It was written by a first-year graduate student at Cornell University, Robert. Morris.

This program is only 99 lines, taking advantage of the shortcomings of the UNIX system, using the finger command to check the list of online users, and then decipher the user password, using the MAIL system to copy and disseminate its own source program, and then compiled to generate code. The original network worms were designed for when the network is idle, the program will be in the computer "wandering" without bringing any damage.

When a machine is overloaded, the program can "borrow resources" from idle computers to load-balance the network. Instead of "borrowing resources", the Morris worm "drains all resources".

What is DDoS? DDoS is also known as a distributed denial-of-service attack. It uses the same methods as a regular denial-of-service attack, but it is launched from multiple sources.

Typically an attacker uses downloaded tools to infiltrate an unprotected host, and after gaining proper access to that host, the attacker installs services or processes (hereafter referred to as proxies) of software in the host. These agents remain asleep until they are instructed from their master to launch a denial-of-service attack against a specified target.

With the widespread use of extremely harmful hacking tools, distributed denial.

3. What is the network security knowledge

1. Physical security

The physical security of the network is the prerequisite for the security of the entire network system. In the construction of campus network engineering, because the network system belongs to the weak electrical engineering, the voltage resistance value is very low. Therefore, in the design and construction of network engineering, priority must be given to the protection of people and network equipment from electricity, fire and lightning; consider the distance between the wiring system and lighting wires, power lines, communication lines, heating pipes and hot and cold air ducts; consider the wiring system and insulated wires, bare wires, as well as the safety of grounding and soldering; must be constructed to protect against lightning, lightning protection system not only to consider the building lightning protection. It must also consider lightning protection for computers and other weak voltage-resistant equipment. Overall physical security risks are mainly, earthquakes, floods, fires and other environmental accidents; power failures; human error or error; equipment theft, destruction; electromagnetic interference; line interception; high-availability hardware; dual-machine multiple redundancy design; computer room environment and alarm systems, security awareness, etc., so pay attention to these safety hazards, but also try to avoid the risk of physical security of the network.

2. Network structure

Network topology design also directly affects the security of the network system. If there is communication between the external and internal networks, the security of the machines on the internal network will be threatened, as well as affecting many other systems on the same network. Through the network propagation, it will also affect other networks connected to the Inter/Intra; the impact may also involve legal, financial and other security sensitive areas. Therefore, it is necessary to design the public server (WEB, DNS, EMAIL, etc.) and the external network and other internal business networks to carry out the necessary isolation, to avoid leakage of network structure information; at the same time, it is also necessary to filter the service requests from the external network, allowing only normal communication packets to reach the corresponding host, other requests for service should be rejected before reaching the host.

3. System security

The so-called system security refers to whether the entire network operating system and network hardware platform is reliable and trustworthy. I'm afraid there is no absolutely secure operating system to choose from, whether it's Microsoft's Windows NT or any other commercial UNIX operating system, its developer must have its own Back-Door. therefore, we can conclude that there is no completely secure operating system. Different users should analyze their networks in detail from different aspects and choose an operating system with the highest possible security. Therefore, it is not only necessary to choose the most reliable operating system and hardware platform, but also to configure the operating system securely. Moreover, it is necessary to strengthen the authentication of the login process (especially before reaching the server host authentication) to ensure the legitimacy of the user; secondly, it should be strictly limited to the login user's operating privileges, the operation will be completed to limit to the smallest possible range.

4. Application systems

The security of application systems is related to specific applications, and it covers a wide range of aspects. Application security is dynamic and constantly changing. The security of applications also involves the security of information, which includes many aspects.

5. - The security of applications is dynamic and ever-changing.

The security of the application involves a lot of aspects to the Inter on the most widely used E-mail system, its solutions are sendmail, scape Messaging Server, Software Post. Office, Lotus Notes, Exchange Server, SUN, CIMS and no less than twenty kinds. Its security means involving LDAP, DES, RSA and other ways. Application systems are constantly developing and application types are constantly increasing. In the application system security, the main consideration as far as possible to establish a secure system platform, and through professional security tools to constantly find loopholes, repair vulnerabilities, improve system security.

6. The security of the application involves the security of information and data.

The security of information involves the leakage of confidential information, unauthorized access, damage to the integrity of information, counterfeiting, and damage to the availability of the system. In some network systems, involving a lot of confidential information, if some important information is stolen or destroyed, its economic, social and political impact will be very serious. Therefore, users must be authenticated to use computers, communication of important information must be authorized, and transmission must be encrypted. The use of multi-level access control and authority control means to achieve security protection of data; the use of encryption technology to ensure the confidentiality and integrity of information transmitted online (including administrator passwords and accounts, upload information, etc.).

7. Management Risk

Management is the most important part of security in the network. Uncertainty about responsibilities and authority, inadequate security management systems, and lack of operability can all lead to management security risks. When there is an attack on the network or the network is subject to some other security threats (such as insiders' irregularities, etc.), there is no way to detect, monitor, report and warn in real time. At the same time, when an incident occurs, it is also impossible to provide tracing clues of hacker attacks and the basis for solving the case, i.e., the lack of controllability and scrutinizability of the network. This requires us to have a multi-level record of site access activities, and timely detection of illegal invasion behavior.

8. The establishment of a new network security mechanism, must y understand the network and can provide direct solutions, therefore, the most feasible approach is to develop a sound management system and strict management combined. Safeguard the safe operation of the network, so that it becomes a good security, scalability and ease of management of the information network will become the first task. Once the above security risks become a fact, the resulting loss of the entire network are difficult to estimate

4. Knowledge of network security

Network security due to different environments and applications have produced different types. There are mainly the following types:

1. System security

Operational system security that is to ensure the security of the information processing and transmission system. It focuses on ensuring the normal operation of the system. Avoid because of the collapse of the system and damage to the system storage, processing and transmission of messages caused by damage and loss. Avoid electromagnetic leakage due to overthrow, resulting in information leakage, interference with others or interference by others.

2, the security of the network

The security of system information on the network. Including user password authentication, user access rights control, data access rights, mode control, security audit. Security issues with the tread. Computer virus prevention and control, data encryption and so on.

3, information dissemination security

Information dissemination security on the network, that is, the security of the consequences of information dissemination, including information filtering. It focuses on preventing and controlling the consequences of the dissemination of illegal and harmful information, and avoiding the loss of control of information on the public network Daiyun Free Han.

4, information content security

Information content security on the network. It focuses on protecting the confidentiality, authenticity and integrity of information. Avoid attackers to use the system's security leakage for eavesdropping, impersonation, fraudulent editing and other detrimental to the behavior of legitimate users. Its essence is to protect the interests and privacy of users.

5. There is no knowledge of some of the network security

Provide a few security tips, that is, a little more wordy ~ ~ ~ a program that does not easily run the unknown If you receive an e-mail with an attachment, and the attachment is the extension of the EXE class of files, then we can not run it hastily, because of this unknown program, there may be a system of destruction.

The attacker is not a good choice.

Attackers often change the name of the system destructive programs sent to you by e-mail with some deceptive themes, tricking you into saying something: "This is a good thing, you must try", "help me test the program" and so on. You have to be on your guard! What we should do with these apparently friendly and well-intentioned email attachments is to immediately delete these files of unknown origin.

Second, block the cookie information The cookie is a data file sent to the computer by the Web server, which records information such as usernames, passwords, and information about the user's interests. In fact, it makes it easier for you to visit the same site without, for example, having to re-enter your password.

However, the personal information collected by cookies can be used by some people who like to play "pranks", and it can pose a security risk. Therefore, you can make the necessary settings in your browser to require the browser to alert you before accepting cookies, or simply reject them. Typically, cookies are automatically deleted from your computer when your browser is closed, but there are many cookies that go against the grain and remain stored on your hard drive to collect information about your users, and which are designed to reside on your computer.

Over time, cookies can become more and more informative, and of course our minds become more and more unsettled as a result. To be sure, these existing cookies should be treated as if they were immediately erased from the hard disk, and the cookie settings should be adjusted in the browser so that the browser rejects the cookie information.

The steps for blocking cookies are: first, click on the "Tools" menu item in the menu bar, and select "Inter Options" from the drop-down menu; then select the "Security" tab in the Options settings box. "Security" tab, and click the tab in the "Custom Level" button; at the same time in the open "Security Settings" dialog box to find the settings on the cookie, and then choose to "Disable" or "Prompt". In addition, you can also use a Windows Vista app, which can be used to store your favorite apps in your Windows Vista account, as well as to store your favorite apps in your Windows Vista account.

But the browser's cache, history, and temporary folders retain too much of our online experience, and once those records are available to the uninitiated, they can be used to find out what personal information is stored there. To make sure that your personal information is completely secure, you should regularly clean your cache, history, and temporary folders.

Clearing your browser's cache is not a big deal, and can be done as follows: First, click on the Tools menu item in the menu bar, and select Inter Options from the drop-down menu; then, in the Options settings box, check the General tab. "General" tab, and click the tab "Delete Files" button to delete the contents of the browser's temporary folder; and then in the same hungry dialog box, click "Clear History Then in the same hungry dialog box, click the "Clear History" button to delete the browser's history and the contents of the cache. Fourth, install a firewall in your own computer to provide isolation protection for your LAN or site, is now commonly used as a safe and effective method, this method is not only for Web services, other services are equally effective.

A firewall is a functional module in a computer or network device located between the internal network and the Inter, an organic component of hardware and software built according to a certain security policy, the purpose of which is to provide security for the internal network or hosts, controlling who has access to internally protected objects from the outside, who has access to the Inter from the internal network, and Which way to access each other. So in order to protect their computer system information from the damage and threat of external information, we can install firewall software in their computer system.

Fifth, the sudden inexplicable failure to check the system information in a timely manner in the process of surfing the Internet, suddenly feel that the computer is not working properly, as if you feel that someone in a distant place remote control you. At this point, you must promptly stop the work in hand, immediately press Ctrl+Alt+Del composite key to see if the system is running any other programs, once found that there is an inexplicable program running, you immediately stop it, so as not to have a greater threat to the entire computer system.

But not all programs appear in the program list when they are running, and some programs such as Back Orifice (a hacker's backdoor program) don't show up in the Ctrl+Alt+Del composite process list, so if you are running WIN98 or WIN2000, it is better to run "Accessories"/"System Tools"/"System Information", and then double-click the "Software Environment", select the "Running Tasks", in the task list to find their own unfamiliar or they do not run the program, once you find the program should immediately terminate it to prevent future problems. Eight, the implementation of encryption protection of confidential information on the confidential information encrypted storage and transmission is a traditional and effective method, this method of protecting the security of confidential information is particularly effective to prevent hitchhiking eavesdropping and hacking, in the current Web services based on a number of network security protocols have been widely used.

O (∩_∩)O haha ~, said so much, I do not know if you have bothered to read on, in fact, as a common network enthusiasts, do not need to exhaust to consider those insecurity factors, but pay attention to it is also a must, you say right?

6. The latest knowledge of network security

Network security refers to the network system hardware, software, and data in its system is protected from accidental or malicious reasons and suffered damage, alteration, leakage, the system is continuous and reliable normal operation, network services are not interrupted. Network security is, in its essence, information security on the network. In a broad sense, all the related technologies and theories involving the confidentiality, integrity, availability, authenticity and controllability of information on the network are the research field of network security. Network security is a comprehensive discipline involving computer science, network technology, communication technology, cryptography, information security technology, applied mathematics, number theory, information theory and other disciplines.

The specific meaning of cybersecurity changes with the "perspective". For example, from the perspective of the user (individual, enterprise, etc.), they want to protect the confidentiality, integrity, and authenticity of information involving personal privacy or commercial interests when it is transmitted over the network, so as to avoid other people or rivals from using eavesdropping, impersonation, tampering, and deniability to infringe on the user's interests and privacy.

Network security should be characterized by the following five aspects:

Confidentiality: the property that information is not disclosed to, or made available to, unauthorized users, entities, or processes.

Integrity: the characteristic that data cannot be changed without authorization. That is, the information is stored or transmitted in the process to maintain the characteristics of not being modified, not destroyed and lost.

Availability: the characteristic that can be accessed by authorized entities and used on demand. That is, the ability to access the required information when needed. For example, denial of service in a network environment, disruption of the normal operation of the network and related systems are all attacks on availability;

Controllability: the ability to control the dissemination of information and content.

Reviewability: the emergence of security issues to provide the basis and means

From the perspective of network operators and managers, they want to access the local network information, reading and writing operations are protected and controlled to avoid the emergence of "trapdoor", viruses, illegal access, denial of service and illegal occupation of network resources and illegal control and other threats, to stop and defend against the emergence of "trapdoor", virus, illegal access, denial of service and illegal occupation of network resources and illegal control. Illegal control and other threats, to stop and defend against attacks by network hackers. For security departments, they want to filter and block illegal, harmful or state secret information to avoid leakage of vital information, harm to the society and great loss to the country. From the perspective of social education and ideology, unhealthy content on the network will hinder social stability and human development, and must be controlled.

With the rapid development of computer technology, the business processed on the computer is also based on a single computer mathematical operations, document processing, based on a simple connection to the internal network of internal business processing, office automation, etc. to the development of a complex intranet (Intra), corporate extranet (Extra), the global interconnection network (Inter) based on the enterprise-level computer processing systems and worldwide information **** enjoyment. Information ****sharing and business processing on a global scale. At the same time as the system's processing capacity increases, the system's connectivity is also increasing. However, in the connection ability information, circulation ability to improve at the same time, based on the network connection of the security problem is also increasingly prominent, the overall network security is mainly manifested in the following aspects: the physical security of the network, network topology security, network system security, application system security and network management security.

Therefore, the computer security problem, should be like every household fire and burglary problems, to do to prevent. Will not even think of yourself will become a target when the threat has appeared, once it happens, often caught off guard, resulting in great losses.

7. On the content of network security knowledge

So first of all, what is the content of knowledge about network security?NO.1 How to avoid the computer was installed Trojan horse program? Install antivirus software and personal firewall, and timely upgrade; consider using a better security browser and e-mail client tools; do not execute any software of unknown origin; unfamiliar mail to antivirus before downloading the attachment in the mail; often upgrade the system and update the virus database; non-essential website plug-ins do not install; regular use of antivirus software to check and kill computer viruses.

NO.2 How to protect personal information in daily life? Do not post train tickets, plane tickets, passports, photos, schedules, whereabouts, etc. on social networking sites; do not choose to automatically save your password when logging in to your account in libraries, print stores, and other public **** occasions, or using someone else's cell phone and remember to log out of your account when you leave; download APPs from commonly used app stores, not from unfamiliar, unknown app stores or website pages; fill out surveys, scan the No.3 What do I need to pay attention to in order to prevent the leakage of personal information? Need to enhance the awareness of personal information security, do not easily provide personal information to unrelated personnel; proper disposal of courier orders, tickets, shopping tickets and other documents containing personal information; personal e-mail, network payment and bank card passwords should be different.

NO.4 How to avoid personal information leakage when receiving courier? Because personal information is on the courier sheet, whether the courier box directly into the trash can or the courier sheet torn down in the dry garbage sorting may leak personal information, so the courier box when receiving the courier should be torn on the face of the sheet.NO.5 can I use personal information when registering (name, date of birth, etc.) as an e-mail address or user name? No. When registering, do not use personal information (name, date of birth, etc.) as your e-mail address or username, as it is easy to crack the database.

NO.6 What should I pay attention to when setting a password for online user registration? The use of consecutive numbers or letters, or your own or your parents' birthdays are all easy to guess or obtain information, so it is risky if you use your birthday as your password. If you use one password for all your accounts, you can lose your passwords and suffer even greater losses.

Therefore, passwords for accounts that involve property or payments should be strong. no.7 How do I prevent my browsing behavior from being tracked? You can prevent your browsing behavior from being tracked by clearing your browser cookies or rejecting cookies.

NO.8 What do I need to pay attention to after the pop-up window prompts for privacy policy when installing a new app? In addition, we have also developed a new way to protect your personal information, which is to make it easier for you to access your personal information, and to protect your computer from being hacked. There are some games that collect too much personal information, such as home address, photo ID, cell phone number, etc. Read the real name information carefully and fill in only the necessary real name information, so you can't disregard your personal information for the sake of the game experience.

The above is a summary of some of the profits I've said about cybersecurity knowledge.