Current location - Education and Training Encyclopedia - Educational institution - Mobile phone network security common sense education
Mobile phone network security common sense education
1. Mobile phone network security knowledge

Common sense of mobile phone network security 1. Network security knowledge

There are different types of network security due to different environments and applications. There are mainly the following types:

1, system security

Running system security is to ensure the security of information processing and transmission system. Its key point is to ensure the normal operation of the system. Avoid the destruction and loss of messages stored, processed and transmitted by the system due to the crash and damage of the system. Avoid information leakage, interference or interference from others caused by electromagnetic leakage.

2. Network security

Security of network system information. Including user password authentication, user access control, data access control, mode control and security audit. Security issues followed. Computer virus prevention, data encryption, etc.

3. Information dissemination security

The security of information dissemination on the network refers to the security of the consequences of information dissemination, including information filtering. The key point is to prevent and control the consequences caused by the spread of illegal and harmful information, and to avoid the uncontrolled information circulating freely on public networks.

4. Information content security

Security of network information content. It focuses on protecting the confidentiality, authenticity and integrity of information. Avoid attackers using the security vulnerabilities of the system to eavesdrop, impersonate, cheat and other behaviors harmful to legitimate users. Its essence is to protect the interests and privacy of users.

2. Network security knowledge content

So what is the first content of network security knowledge? NO. 1 How to prevent the Trojan horse program from being installed on the computer? Install anti-virus software and personal firewall, and upgrade in time; Consider using more secure browsers and mail client tools; Do not execute any software of unknown origin; Download the attachment in the email after the unfamiliar email needs antivirus; Frequently upgrade the system and update the virus database; Do not install unnecessary website plug-ins; Regularly use anti-virus software to kill computer viruses.

NO.2 how to protect personal information in daily life? Don't post train tickets, plane tickets, passports, photos, schedules, whereabouts, etc. Social networking software; In public places such as libraries, printing shops, or using other people's mobile phones to log in to your account, don't choose to automatically save your password, and remember to cancel your account when you leave; Download apps from popular app stores, not from unfamiliar and unknown app stores or website pages; Fill in the questionnaire, scan the QR code to register, and try not to use real personal information. NO.3 what should I pay attention to to prevent personal information from leaking? Need to enhance personal information security awareness, do not easily provide personal information to irrelevant personnel; Properly handle documents containing personal information such as express orders, tickets and shopping receipts; Personal email, online payment and bank card passwords should be different.

NO.4 how to avoid personal information disclosure when receiving express delivery? Because personal information is on the courier, whether the courier box is directly put into the trash can or torn off, putting it into dry garbage sorting may reveal personal information. Therefore, when you receive the courier, tear off the face sheet on the courier box. Can I use personal information (name, date of birth, etc.)? ) as the email or user name when registering? Try not to use personal information (name, date of birth, etc.) when registering. ) as a mailbox address or user name, it is easy to be cracked by database conflicts.

NO.6 what should I pay attention to when registering users online and setting user passwords? Continuous numbers or letters, one's own or parents' birthdays are easily guessed or obtained information, so it is very risky to use birthdays as passwords. And if all accounts use a password, once the password is lost, it is easy to cause greater losses.

Therefore, passwords involving property and payment accounts should use high-strength passwords. NO.7 how to prevent browsing behavior from being tracked? You can prevent browsing behavior from being tracked by clearing browser cookies or rejecting cookies.

NO.8 when installing a new APP, what should I pay attention to after the pop-up window prompts the privacy policy? Information on the website of net safe; Download the attachment in the email after the unfamiliar email needs antivirus; When downloading resources, give priority to green websites with high security. NO.9 now the game has set up an anti-addiction mechanism for minors. Usually users need real-name authentication and fill in real-name information. What should I pay attention to? Some games will over-collect personal information, such as home address, ID photo, mobile phone number, etc. Read the real-name information carefully, only fill in the necessary real-name information, and you can't ignore personal information for the game experience.

The above is a summary of some benefits of what I said about network security knowledge.

3. What specific aspects should we know about network security?

I agree with friends of fkdcm as follows: Chapter 1 Introduction Chapter 2 Overview of Network Security Chapter 3 Network Security Solutions Chapter 4 Typical Application Cases Chapter 5 Future Development Trend of Network Security Solutions Chapter 1 Introduction Today's network operators are experiencing an exciting information explosion era, and the network backbone bandwidth will double every six to nine months on average.

As the main business type that plays a leading role, data service requires and promotes the fundamental change of network structure. The emergence of optical Internet has laid a new foundation for network application based on IP technology.

With the popularization of network, the application of information network technology and the expansion of key business systems, the security of business systems in telecom industry has become an important issue affecting network efficiency. Openness, internationality and freedom of interest not only increase the freedom of application, but also put forward higher requirements for security. Due to the changes in the international situation, the possibility of "cyber war" has intensified, and ensuring the security of network and information is directly related to the country's economic security and even national security.

Therefore, how to protect the information network system from hackers and spies has become an important issue to be considered for the healthy development of the national telecom basic network. In the new telecom market environment, the diversification of demand and the personalization of information consumption have gradually become an inevitable trend, especially in the field of data communication.

After several years of hard work, the scale and technical level of public data communication network have made a leap, the number of users has continued to grow at a high speed, and the information service users have developed particularly rapidly. The number of users in the whole country has been increasing, and they have begun to transfer to enterprise users. * * * The Internet access project is progressing smoothly, and e-commerce is fully launched. China Telecom's security certification system has passed the joint appraisal of China Password Management Committee and the Ministry of Information Industry, and has carried out effective cooperation with the financial sector. Telecom also provides Internet access service, IP telephone service and other services. IP bearer network carries the unified platform of image, voice and data, emphasizes Qos, VPN and accounting, and becomes a multi-service bearer network in the new era.

The development direction of China Telecom data communication is network service and personalized service. This kind of network is actually very rich in functions, such as stored-value card business, e-commerce authentication platform, virtual private network and so on.

And all this depends on the guarantee of network security. Without security, personalized service is impossible. Only when the telecommunications foundation is sound, the functions are strengthened, and the security issues are guaranteed can we provide truly personalized services.

Due to the particularity of the telecommunications sector, the transmission of important information is the basis of the entire national communication system. Its security is particularly important.

Because some of our technologies are still far behind foreign countries, almost all the existing or under construction network equipment and network security products in China are products of foreign manufacturers. Only by using information security products independently developed by China and security products with independent copyright can we truly grasp the initiative of the information battlefield and fundamentally prevent all kinds of illegal and malicious attacks and sabotage.

Nowadays, most computer networks base their security mechanism on the network layer security mechanism, and think that network security is only devices such as firewalls and encryption machines. With the expansion of network interconnection and the diversification of specific applications, this security mechanism is very limited for the network environment.

Facing all kinds of threats, we must take effective measures to ensure the security of computer networks. We must have a deep understanding of the network, make a rigorous analysis of the security requirements, and put forward a perfect security solution.

According to the specific network environment and application of telecommunication network, this scheme introduces how to establish a complete network security solution for telecommunication department. The second chapter summarizes the definition of network security. What is computer network security? Although this word is very popular now, not many people really have a correct understanding of it.

In fact, it is not easy to correctly define computer network security. The difficulty lies in forming a comprehensive and effective definition. Generally speaking, safety means "avoiding risks and dangers".

In computer science, security is prevention: unauthorized users access information without authorization and try to destroy or change it. This can be rephrased as "security is the ability of a system to protect the confidentiality and integrity of information and system resources". Note that the scope of the second definition includes system resources, namely CPU, hard disk, programs and other information.

In the telecommunications industry, the meaning of network security includes: the reliability of key equipment; Security of network structure and routing; With network monitoring, analysis and automatic response functions; Ensure that the network security related parameters are normal; It can protect the open servers of telecommunication networks (such as dial-up access servers). ) and the security of network data. The key is to meet the requirements of telecommunication network and ensure its security without affecting the network efficiency.

The specific network application of telecom industry (combined with typical cases) The technical positioning of the whole telecom network is that optical fiber is the main transmission medium and IP is the main communication protocol. Therefore, when choosing security products, we must meet the requirements of telecommunication network.

For example, the firewall must meet various routing protocols, QOS guarantee, MPLS technology implementation, speed requirements, redundancy and other requirements. These are the first issues that telecom operators should consider.

Telecom network provides channels, so IP optimization is particularly important, including at least the following elements: IP optimization of network structure. The network architecture is based on IP and embodied in the hierarchical architecture of the network layer, which can reduce the dependence on the traditional transmission system.

Optimization of IP routing protocol. Optimization of IP packet forwarding.

It is suitable for the characteristics of large-scale high-speed broadband networks and the next generation Internet, and provides high-speed route lookup and packet forwarding mechanisms. Bandwidth optimization.

Under reasonable QoS control, the bandwidth of optical fiber can be used to the maximum extent. Stability optimization.

Maximize the ability of fast switching of optical transmission in fault recovery, quickly restore network connection, avoid the whole network shock caused by routing table jitter, and provide reliability and stability to meet the requirements of high-speed broadband network. From the backbone network carrying capacity, reliability, QoS, scalability, network interconnection, communication protocol, network management, security, multi-service support and so on.

4. How much do novices know about network security?

Various application softwares are interrelated, such as e-wallet software and payment gateway software. Check and confirm unknown security vulnerabilities in installed software: (1), such as browser software.

System security related to online payment and settlement includes the following measures, which are independent of any other security protection measures of the network, but people can't completely rely on it to solve the security problems of e-commerce applications. The security business on the application layer can involve authentication and access control, which is related to the hardware platform and operating system of the network system. From the perspective of the overall e-commerce system or online payment system, it refers to security protection and media security.

(1) Protect network security. Network security is to protect the security of communication process between network-side systems of all business parties.

Ensuring confidentiality, integrity, authentication and access control is an important factor in network security. The main measures to ensure network security are: (1) overall planning of network platform security strategy and Web security.

Although some protection measures may replace or overlap network security services, the security of Web security, EDI and network payment applications. (3) Protect system security.

Protect system security, non-repudiation, data integrity and confidentiality. Because the application layer in e-commerce has the strictest and most complicated requirements for security, it is more inclined to take various security measures at the application layer than at the network layer.

Although network layer security still has its special status, computer network security measures mainly include three aspects: protecting network security, protecting application service security and protecting system security, and all aspects should be combined with physical security, firewall and information security. (4) Record all activities on the network as much as possible.

(5) Pay attention to the physical protection of network equipment. (6) Test the vulnerability of the network platform system.

(7) Establish a reliable identification and discrimination mechanism. (2) Protect application security.

Protecting application security, such as the encryption of network payment settlement package by Web browser and Web server in application layer, is all encrypted through IP layer, which strictly manages the security of system users and makes the system have the minimum penetration risk. For example, you have to pass a lot of authentication before you can connect, but many applications also have their own specific security requirements, mainly for specific applications (such as Web servers), and all access data must be audited.

(2) Formulate network security management measures. (3) Using firewall and special software system to establish security protection measures for online payment.

(2) Combination of technology and management.

5. What are the tips for Internet security?

With the continuous improvement of modern life, computers have become popular in families, and people have begun to learn to arrange their lives, play games, make friends, shop and even form virtual families through the Internet. While enjoying themselves, people should not ignore the potential danger factors in this virtual world, especially primary and secondary school students, and should master some common knowledge of Internet security.

1。 You can't meet strangers without your parents' consent.

If you must meet, you'd better go with your parents and choose some public places as the appointed places. 2。

Primary and secondary school students should not tell others their photos, credit cards or bank information before telling their parents or guardians. 3。

If you receive some vulgar and obscene emails, don't reply. When you find some unsightly pictures and words on the Internet, turn them off immediately and tell your parents.

4。 If someone uses words or words that make you feel uncomfortable or worried, don't continue the conversation. Tell your parents or guardians and ask for their help.

5。 Don't tell others your home address, telephone number or school name without your parents' permission.

6。 Don't go to those websites with bad information because of curiosity.

6. Middle school students' knowledge of network security

One: the benefits of middle school students surfing the Internet:

(1) You can broaden your horizons.

Internet is an encyclopedic world with rich information, rapid information exchange and strong freedom, which has realized global information sharing. Middle school students can get their own needs at will, browse the world online, get to know the world and know the latest news and information in the world, which greatly broadens their horizons and brings great convenience and fun to their study and life.

(2) Strengthen foreign exchanges.

The network has created a virtual new world, in which every member can transcend the limitation of time and space, avoiding the friction and injury when people communicate directly, thus providing a brand-new communication place for people to meet their emotional needs and obtain information. Middle school students can further expand the space-time field of foreign exchange and realize the liberalization of making friends. At the same time, middle school students are mostly only children and lonely at home. Psychologically, they are the most eager to communicate with others. Communication in real life may bring them pressure, especially those who are introverted. The network has given them new communication space and a relatively relaxed and equal environment.

(C) to promote the individualized development of middle school students

The world is rich and colorful, so should the development of mankind. The Internet provides an infinite variety of development opportunities for this environment. Middle school students can find their own development direction online, and they can also get resources and motivation for development. Learning, research and even innovation can be realized by using the Internet, which is the most efficient learning. There is a huge amount of knowledge to learn on the Internet, which provides a very broad field for middle school students to carry out long-span association and imagination, and constantly provides nutrients for creative thinking. Some computer games can strengthen the logical thinking ability of middle school students to some extent.

(d) Expand the space for middle school students to receive education today.

Internet resources can help middle school students find suitable learning materials, even suitable schools and teachers, which has begun to become a reality, such as some famous online schools. It is worth mentioning that there are many students with learning difficulties, but they don't complain at all about learning computers and making web pages. It can be seen that their backwardness is mainly because their personality type and ability tendency are not suitable for a certain teaching mode. It can be said that the Internet provides a vast world for these "poor students" to display their intelligence.

The history of scientific and technological development has continuously proved that science and technology are like a double-edged sword, which is beneficial to human development and harmful to human interests. As a technological newborn in the information society, the network also has this duality without exception. At the same time, due to the immaturity of middle school students' physical and mental development, the particularity of the network and the imperfection of the network development, we should not only see the beneficial side of computer network to middle school students, but also see its negative impact and pay enough attention to it.

Second, the disadvantages of middle school students surfing the Internet

(A), the richness of network information is easy to cause "information pollution" to middle school students.

Network is a treasure house of information and a garbage dump of information. All kinds of information on the internet coexist, and it is difficult to distinguish between true and false. Due to the lack of effective supervision, negative information such as pornography and reaction is common on the Internet. At the same time, the interactivity and equality of the network enable people to receive and disseminate information in an absolutely free environment. These bad information are difficult to resist the negative influence of bad information for middle school students who are in the stage of physical and mental development and have weak ability of distinguishing right from wrong, self-control and choice. Individual Internet cafe operators even seize this characteristic of middle school students, shielding, conniving and supporting them to log on pornographic and violent websites, making them addicted to the Internet. As a result, some middle school students can't make ends meet until they embark on the criminal road of theft, robbery and murder.

(2) The arbitrariness of network information dissemination easily weakens middle school students' moral consciousness.

The colorful network information has greatly enriched the spiritual world of middle school students. However, due to the randomness of information dissemination, thoughts and concepts are also full of it, which has great temptation to middle school students with weak self-monitoring ability and great curiosity, leading to the lack of moral norms. At the same time, the concealment of information reception and dissemination on the internet makes it easy for middle school students to indulge their behavior on the internet, do what they want to do completely according to their own wishes, and forget their social responsibilities. Some middle school students don't think that "lying in online chat is immoral" and think that "you can do anything without restraint", which greatly weakens the binding force of middle school students on their own behavior and gradually increases bad online behavior.

(3) The temptation of the Internet leads to the symptoms of "Internet addiction" and "Internet loneliness" among middle school students.

The internet is full of new things, and it is still increasing. Therefore, it has infinite attraction to middle school students who are easy to accept new things, which often leads to their extreme fascination with the internet. Male and middle school students are the main group of internet addiction. Because of their weak psychological quality and self-control, they have become a frequent group of network psychological disorders. Because they regard the online world as real life, divorced from the times, and have no common language with others, they show loneliness, depression, slow thinking, low self-evaluation, and even suicidal thoughts and behaviors. Medically, this symptom is called "Internet addiction syndrome" or IAD for short.

In short, with the continuous progress of society, the network security education of middle school students is our top priority. Parents and friends, let's educate our children together, so that the network can truly become a mentor of middle school students' friends!

7. Where can I find information about network security knowledge?

How about this? Transmission route of QQ virus: 1. The information contains an unknown URL (preventive measures: don't open it in a hurry, please ask the other friend to confirm the source of the information first). 2. Unknown transfer file (including sending pictures as files).

Precautions: It is best not to receive unknown documents and pictures. Basically, QQ spreads viruses in the above two forms. The URL sent by a friend may be partially sent by the system because the other party has been poisoned. So, don't rush to open it.

If you are poisoned, hehe, then slowly find anti-virus software or redo the system. QQ anti-theft: The main forms of QQ anti-theft are as follows: 1. A QQ website gives away QQ coins for free, and you can get QQ coins by entering the QQ number and password (the general page is very similar to the official, except that the login database is not connected to the official, and everything else is connected to the official. As long as you log in to that page for a while, the password of QQ is wrong, which is normal) 2. QQ number wins the prize. Suddenly, a stranger appeared in your QQ, sent you a message saying that your number won the lottery, and then gave you an address to fill in your QQ password or directly asked for your QQ account password. Don't even think about it, it must be a lie! The official won't ask you for the password.

3.QQ mailbox lied about winning the prize, which is out of date. To put it another way, I recently said that 5 or 6 QQ numbers are free at any station. This is to defraud the click-through rate, which is generally harmless to everyone, but it is a bit interesting. I used this to trick people into clicking on the website.

I really talk nonsense. QQ 5。 There are only two official websites of QQ: and there is no third domain name for the time being. So apart from these two websites, there can't be a third official website. Some people use foreign domain names, the front is the same, but the back is the national domain names of other countries, so they are generally liars. Others are slowly updated, I hope everyone will not be deceived and used by scammers! Get something for nothing

There are many online scammers, so be careful of the embankment.