Current location - Loan Platform Complete Network - Big data management - Computer network security issues and preventive measures
Computer network security issues and preventive measures

With the rapid development of computer technology, computer networks face increasingly prominent security problems, seriously affecting the healthy development of the network. The following is my collection of computer network security issues and preventive measures, I hope to help you~~

Computer Network Security Issues and Preventive Measures

Nowadays, the wide application of computer network technology has greatly accelerated the development of today's society, which has brought mankind into a completely new era, and brought unprecedented convenience to people's learning, work, life and other aspects. However, with the rapid development of computer network technology, computer network resources *** enjoy further strengthened, a large number of data stored and transmitted in the network will need to be protected, and consequently the computer network security issues are becoming increasingly prominent, constantly threatening the security of computer networks. Therefore, how to improve the computer network facing threats to the defense capability, looking for computer network security measures, has become the current information world urgently need to solve the problem.

First, the definition of computer network security

Computer network security refers to the use of network management control and technical measures to ensure that in a network environment, the network system software, hardware and all the data running in its system are protected by security from damage, change and leakage due to accidental or malicious reasons. There are two aspects of computer network security? Logical security and physical security. Logical security includes the integrity, confidentiality and availability of information. Physical security refers to the system equipment and related facilities are physically protected from damage, loss, etc..

Second, the characteristics of computer network security

There are many features of computer network security, but the most important is the following five computer network security issues and preventive measures computer network security issues and preventive measures.

(a) Integrity

Integrity refers to the data in the computer without authorization, you can not modify the characteristics. That is to say, the data in the storage or transmission process to maintain the characteristics of not being modified, not destroyed and can not be lost.

(ii) Confidentiality

Confidentiality is when the information in the computer without permission, can not be leaked to unauthorized users, and can not be used in any other form by illegal users.

(C) controllability

Controllability means that when the data in the network in the process of transmission, the data should always be strictly controlled to prevent unnecessary errors.

(d) Reviewability

Reviewability means that when a computer network has a security problem, there should be a way to detect it, that is, to provide countermeasures to solve the network security problems.

(V) availability

Availability refers to the information in the computer can be accessed by authorized users and according to their own needs to use the characteristics of the computer network security issues and preventive measures article computer network security issues and preventive measures from / article/wk-78500001346158.html, reproduced, please retain this link! . That is, whether users can access and use the information they need when they need it.

Third, the threat of computer network security

(a) computer viruses

Computer viruses are compilers inserted in the computer program to destroy computer functions or data, affecting the use of computers and can be self-replicating a set of computer commands or program code, which has its own unique replication capabilities. Computer viruses are one of the most important threats to network security. Computer viruses are parasitic, destructive, latent, hidden and infectious. Viruses spreading in the network will cause the network to run slowly or even paralyze, which seriously affects the security of computer networks. Therefore, to strengthen the study of computer viruses and actively protect has become urgent.

(II) malicious attacks

Malicious attacks are a kind of intentional, man-made destructive behavior, which can cause a great threat to the computer network. It can be divided into two categories: passive attacks and active attacks. Among them, passive attack is mainly the attack of intercepting information, that is, it is the attacker eavesdropping on the content of other people's communication from the network. With the purpose of obtaining information from the other party, the attacker steals the other party's confidential information without his/her knowledge, but does not disrupt the normal operation of the system. Active attacks are mainly forgery, interruption and tampering with information attacks Computer Network Security Issues and Prevention Countermeasures Essay Forgery is when an attacker forges information to be transmitted in a network. Interruption means that the attacker intentionally interrupts the communication of others on the network. Tampering is when an attacker intentionally tampers with messages transmitted over a network. Both passive and active attacks may greatly damage the security of a computer network and may leak some important data, thus causing great losses to the users of the computer network. Therefore, reasonable precautions must be employed.

C) System vulnerability

Computer system vulnerability refers to the hardware, software, protocols, or in the specific realization of the system security policy flaws, and let the illegal or hacker to use these defects and errors implanted Trojan horses, viruses on the computer for attack or control, resulting in the computer data and information theft, or worse, will destroy the computer system, resulting in computer system paralysis. Computer system paralysis. Computer system vulnerabilities can have a significant impact on the computer, including the computer system itself and its software running in the computer, as well as the users of the computer system, servers and routers in the network, etc.. Although computer system vulnerabilities are always present, we can repair the vulnerabilities in the network to achieve the protection of the computer network.

(D) network hackers

Along with the progress of computer network technology, and thus the emergence of a class of people specializing in the use of computer networks to carry out crimes, those illegal elements with their own mastery of computer technology, specializing in the destruction of computer systems and network systems, these people are commonly known as hackers. They illegally log on to other people's computers through special technology without permission and carry out some illegal operations on the logged-in computers, such as modifying and destroying important data. They can also achieve control of other computers through program commands or implant some destructive viruses into computers to achieve the purpose of controlling and destroying computers in the network.

(E) network communication itself exists in the security threat

Although most of the current network connection is connectionless, but in order to communicate the needs of the connection, there are still many places where the connection is oriented to the connection, that is, the physical connection. This gives network security a major weakness. Anyone who wants to disrupt the network can connect their computer to the network and intercept any useful information from it, as long as they have physical access to the cables and the right tools.

Four, computer network security countermeasures

(a) data encryption strategy

To ensure that the data and information transmitted in the computer network will not be stolen by illegal users, change, delete, etc., the data should be encrypted using encryption technology. Data encryption refers to the encryption of data stored in the computer system or to be transmitted, so that this important information becomes a cipher computer network security issues and preventive measures computer network security issues and preventive measures. In this way, even if the attacker of the computer to get these data can not correctly interpret the actual meaning of these data, only the legitimate user with the password can read the encrypted data, so as to achieve the purpose of the protection of these data. The widespread use of encryption technology is a favorable tool to ensure the security of computer network data.

(II) data backup strategy

Even if the data in the computer network to do a good job of protection, it is inevitable that there will be a time of destruction, perhaps man-made, perhaps the computer's own problems, such as system crashes, resulting in the loss of important data in the computer to modify. Therefore, good backup of these important data is one of the most effective measures to solve the data security problem. When data security problems occur, the use of backup data can make the computer data back to the state before the error, so that the computer user to bring the least loss. Nowadays, the most commonly used backup methods are: CD-ROM backup data, tape backup data, mirror backup data and other computer network security issues and preventive measures article computer network security issues and preventive measures from /article/wk-78500001346158.html, reproduced, please retain this link!

(C) virus protection strategy

Once the computer network system suffered a computer virus attack, may bring very serious consequences to the user. Therefore, it is necessary to take a variety of virus prevention measures to combat viruses, do not give the virus to take advantage of the opportunity. The use of network antivirus software can play a role in preventing viruses. These antivirus software should be able to prevent viruses, detect viruses and remove viruses that appear. The use of anti-virus software for the network to correctly identify the virus, the network generated by the virus prevention, antivirus processing, so that you can thoroughly and completely remove the virus in the network.

(D) Vulnerability scanning and repair strategy

Vulnerability scanning usually refers to the use of computer software to scan the system on a regular basis to check whether there is a vulnerability, if there is a vulnerability should be repaired in a timely manner. The method of repair is to use the optimized system configuration and the use of patches downloaded from the network, etc., to maximize the filling of the latest security holes and eliminate security risks, which can achieve the purpose of preventing viruses from invading the computer through the vulnerability. The regular repair of vulnerabilities can better protect the user's safety online, and better protect the computer.

(E) network firewall strategy

Firewall is a well-established and widely used network security mechanisms, it can be two different networks through the communication between the strict control to determine whether the two networks can exchange information, communication, so as to be able to protect the network security. They mainly utilize the signature technology, through the gateway at the checking operation computer network security problems and preventive countermeasures thesis firewall use, to the security of the network to bring a good preventive mechanism, they can be very effective in preventing such as worms, Trojan horses, etc. in the spread of the network between.

(F) Enhance the network security awareness strategy

Users should enhance the security awareness of the use of the network, cultivate good habits of using the network, do not download software containing threatening viruses on the Internet, do not browse the website that may produce attacks on the computer network, the download of software in a timely manner after the antivirus treatment, and the development of a frequent scanning of computers to antivirus operations, to prevent the source of the Trojan horse and viruses to the computer network. The first thing you need to do is to get rid of all the bugs in your computer, and then you'll be able to get rid of all the bugs in your computer.

In short, computer network security problems are unavoidable. As long as we never slacken off, timely solution to security problems, while attaching great importance to the prevention of computer network security. The use of advanced technology to establish a strict security system, strengthen the user's awareness of prevention, construction of a full range of preventive strategies to give the normal operation of the computer network to ensure that the computer network to a more healthy development, so as to give the computer users to bring endless convenience.

References:

[1]Lu Ming,Li Zhongjun. Analysis of computer network security problems and preventive measures[J]. Computer CD-ROM Software and Application,2010,9