Traditional Culture Encyclopedia - Traditional festivals - Common problems and hidden dangers of network security do not include
Common problems and hidden dangers of network security do not include
Network security means that the hardware and software of the network system and the data in the system are protected and will not be destroyed, changed or leaked due to accidents or malicious reasons, and the system will continue to operate reliably without interrupting network services.
Network security usually refers to the security of computer networks, and in fact it can also refer to the security of computer communication networks. Computer communication network is a system that connects multiple computers with independent functions through communication equipment and transmission media, and realizes information transmission and exchange between computers with the support of communication software.
Therefore, the computer network is secure, and the corresponding computer communication network must also be secure, which should be able to realize information exchange and resource sharing among network users. Hereinafter, network security refers to both computer network security and computer communication network security.
Network security risk
1, Internet is an open network with no control mechanism. Hackers often invade the computer system in the network, or steal confidential data and privileges, or destroy important data, or make the system function not fully play until it is paralyzed.
2. Internet data transmission is based on TCP/IP communication protocol, which lacks security measures to prevent information from being stolen during transmission.
3. Most communication services on the Internet are supported by Unix operating system, and obvious security vulnerabilities in Unix operating system will directly affect security services.
4. The electronic information stored, transmitted and processed on the computer has not been envelope protected, signed and stamped like the traditional mail communication. Whether the source and destination of information are true, whether the content has been changed and whether it has been leaked is maintained through the gentleman's agreement in the service agreement supported by the application layer.
- Related articles
- The process of picking up relatives the day before marriage
- What is the "four-day work system" scheduling method?
- 2019 Liaoyuan city government work report (full text)(2)
- What are the necessity and the main problems to be faced in promoting fine agriculture in China?
- Analysis of the current situation of Chinese fast food
- Who are the world famous furniture design masters and their masterpieces
- Former Minnan ballads. . Who knows.
- How to write words in classroom English
- How to make the dough of pie soft?
- Working principle of three-leaf roots blower