Current location - Quotes Website - Personality signature - What does the network security mechanism include?
What does the network security mechanism include?
Network security mechanism includes access management, security monitoring and security recovery.

Access management mainly deals with identity management and access control to control the use of information resources; The main functions of safety monitoring include safety alarm setting and inspection tracking; Security recovery is mainly to recover the information lost due to network failure in time.

Access or access control is an important means to ensure network security. It controls the different authorized access of different levels of subjects to target resources through a set of mechanisms, and realizes the safe management and use of network resources after authenticating the subjects.

Types of network security

(1) system security

Running system security is to ensure the security of information processing and transmission system. Its key point is to ensure the normal operation of the system. Avoid the damage and loss of messages stored, processed and transmitted by the system due to the crash and damage of the system. Avoid information leakage, interference or interference from others caused by electromagnetic leakage.

(2) Network information security

Security of network system information. Including user password authentication, user access control, data access control, mode control and security audit. Security issues followed. Computer virus prevention, data encryption, etc.

(3) Information dissemination safety

The security of information dissemination on the network refers to the security of the consequences of information dissemination, including information filtering. The key point is to prevent and control the consequences of illegal and harmful information dissemination, and avoid the information freely disseminated on public networks from getting out of control.

(4) Information content security

Security of network information content. It focuses on protecting the confidentiality, authenticity and integrity of information. Prevent attackers from taking advantage of the security vulnerabilities of the system to eavesdrop, impersonate, cheat and other behaviors harmful to legitimate users. Its essence is to protect the interests and privacy of users.