Network security solution
The feature that information will not be disclosed or used by unauthorized users, entities or processes.
complete
The characteristics of data cannot be changed without authorization. In other words, information remains unchanged, not destroyed or lost during storage or transmission.
usability
Functions that authorized entities can access and use on demand. That is, whether the required information can be accessed when needed. For example, denial of service in the network environment, destroying the normal operation of the network and related systems, are all attacks on usability;
controllability
Ability to control the dissemination and content of information.
Examination ability
Provide basis and means when security problems occur.
From the perspective of network operators and managers, we hope to protect and control the access, reading and writing of local network information, so as to avoid threats such as "trap door", virus, illegal access, denial of service and illegal occupation and control of network resources, and to prevent and defend the attacks of network hackers. For the security department, they hope to filter and prevent illegal, harmful or state secrets, so as to avoid the disclosure of confidential information, avoid harm to society and cause great losses to the country.
With the rapid development of computer technology, the business processed on the computer has also developed from a single computer-based mathematical operation, file processing, internal business processing and office automation based on a simple intranet to an enterprise-level computer processing system based on a complex intranet, extranet and Internet, and information sharing and business processing have spread all over the world.
While the processing capacity of the system is improving, the connection capacity of the system is also improving. However, with the improvement of connection information and circulation ability, the security problem based on network connection has become increasingly prominent. The overall network security is mainly manifested in the following aspects: network physical security, network topology security, network system security, application system security and network management security.