Current location - Quotes Website - Personality signature - The network security handwritten newspaper for grade 2 is simple and beautiful
The network security handwritten newspaper for grade 2 is simple and beautiful

1. Network attacks

1. Attacks on the network can be roughly divided into two categories: service supply and non-service attacks. The attack methods can be divided into 8 categories: system intrusion attacks, buffer overflow attacks, deception attacks, denial of service attacks, firewall attacks, virus attacks, Trojan horse attacks and backdoor attacks.

2. Service attack (Application Dependent Attrack) refers to launching an attack on a server that provides certain services for the network, causing a "denial of service" on the server and causing the network to work abnormally. The effects of Denial-of-Service Attrack are manifested in consuming bandwidth, consuming computing resources, crashing systems and applications, etc., causing legitimate users of a certain service to be unable to access services that they have permission to access.

3. Non-service attacks (Application Independent Attrack) do not target a specific application device, but attack low-level protocols such as the network layer. This type of attack often exploits vulnerabilities in protocols and operating systems when implementing protocols to achieve the purpose of attack. It is a more subtle and dangerous attack method.

2. Information Security

1. Information security in the network mainly includes two aspects: information storage security and information transmission security.

2. Information storage security refers to how to ensure that information statically stored in networked computers will not be illegally used by unauthorized network users.

3. Information transmission security refers to how to ensure that information is not leaked or attacked during network transmission.

The main threats to information transmission security are: interception of information, tampering with information and forgery of information.

The main technology to ensure information security in network systems is data encryption and decryption.

3. Anti-repudiation issue

Anti-repudiation refers to how to prevent the information source user from not acknowledging the information he or she has sent, or from the user not acknowledging the information after accepting it. Methods such as identity authentication, digital signatures, digital envelopes, and third-party confirmation are needed to ensure the legality of network information transmission and prevent the occurrence of repudiation.

4. Internal network security precautions

We sometimes hear news like this: customer information of a certain company was leaked, and it was found that it was caused by back-end theft by a resigned employee of the company. Security prevention within the network refers to how to prevent users with legitimate identities from intentionally or unintentionally leaking behaviors that are harmful to network and information security. To solve the insecurity factors within the network, we must start from two aspects: on the one hand, monitor the network operating status and user working status at any time through network management software, and record and audit the usage status of extremely important network resources (hosts, databases, disks, etc.) ; The two aspects are to specify and improve the network use and management system, and strengthen user training and management.

5. Network anti-virus

Current viruses can be roughly divided into 6 categories: boot viruses, executable file viruses, macro viruses, hybrid viruses, Trojan viruses and Internet language viruses . Network anti-virus needs to be solved from two aspects: anti-virus technology and user management.

6. Network data backup and disaster recovery

No matter how powerful an enterprise is, it is impossible to avoid network disasters, some of which are considered to be avoidable disasters (such as administrator errors and accidental deletion of data) , some disasters are unavoidable, such as unexpected power outages and line damage. Alipay and WeChat also experienced several outages last year. Therefore, network data backup and disaster recovery are extremely important.

In the actual network operating environment, data backup and recovery functions are very important. Although they can be avoided from a preventive perspective, it is impossible to completely guarantee that the system will not go wrong.