Current location - Education and Training Encyclopedia - Educational Knowledge - Network security blackboard information
Network security blackboard information
Network security blackboard material 0 1

Network security blackboard material 02

Network security blackboard material 03 basic terms of network security

In general, the relationship between system security and performance and function is contradictory. If a system does not provide any service (disconnection) to the outside world, the outside world cannot pose a security threat. However, when enterprises access the Internet and provide services such as online stores and e-commerce, it is equivalent to building an internal closed network into an open network environment, which also opens up encrypted component programs, and various security issues, including system-level security issues, also arise.

Building a network security system, on the one hand, because of authentication, encryption, monitoring, analysis, recording and other work, affects the efficiency of the network and reduces the flexibility of customer applications; On the other hand, it also increases the management cost.

However, the security threat from the network is real, especially when running key business on the network, network security is the first problem to be solved.

Select appropriate technologies and products, and formulate flexible network security strategies based on UniNAC technology to provide flexible network service channels while ensuring network security.

Adopting appropriate security system design and management scheme can effectively reduce the impact of network security on network performance and reduce management costs.

All-round security system:

Similar to other security systems (such as security systems), the security system of enterprise application systems should include:

Access control: By establishing an access control system for specific network segments and services, most attacks are prevented from reaching the target.

Check for security vulnerabilities: By regularly checking for security vulnerabilities, most attacks can fail even if they can reach their targets.

Attack monitoring: Through the attack monitoring system established for specific network segments and services, most attacks can be detected in real time, and corresponding actions can be taken (such as disconnecting the network connection, recording the attack process, tracking the attack source, etc. ).

Encrypted communication: Active encrypted communication can prevent attackers from understanding and modifying sensitive information.

Authentication: A good authentication system can prevent attackers from impersonating legitimate users.

Backup and recovery: A good backup and recovery mechanism can restore data and system services as soon as possible when attacks cause losses.

Multi-layer defense, after the attacker breaks through the first line of defense, delays or prevents him from reaching the target.

Hide internal information, so that attackers can't understand the basic situation in the system.

Set up a security monitoring center to provide security system management, monitoring, drainage protection and emergency services for information systems.