Traditional Culture Encyclopedia - Traditional festivals - Common problems and hidden dangers of network security do not include

Common problems and hidden dangers of network security do not include

The factors affecting network security do not include the unsafe factors of computer hardware.

Network security means that the hardware and software of the network system and the data in the system are protected and will not be destroyed, changed or leaked due to accidents or malicious reasons, and the system will continue to operate reliably without interrupting network services.

Network security usually refers to the security of computer networks, and in fact it can also refer to the security of computer communication networks. Computer communication network is a system that connects multiple computers with independent functions through communication equipment and transmission media, and realizes information transmission and exchange between computers with the support of communication software.

Therefore, the computer network is secure, and the corresponding computer communication network must also be secure, which should be able to realize information exchange and resource sharing among network users. Hereinafter, network security refers to both computer network security and computer communication network security.

Network security risk

1, Internet is an open network with no control mechanism. Hackers often invade the computer system in the network, or steal confidential data and privileges, or destroy important data, or make the system function not fully play until it is paralyzed.

2. Internet data transmission is based on TCP/IP communication protocol, which lacks security measures to prevent information from being stolen during transmission.

3. Most communication services on the Internet are supported by Unix operating system, and obvious security vulnerabilities in Unix operating system will directly affect security services.

4. The electronic information stored, transmitted and processed on the computer has not been envelope protected, signed and stamped like the traditional mail communication. Whether the source and destination of information are true, whether the content has been changed and whether it has been leaked is maintained through the gentleman's agreement in the service agreement supported by the application layer.