After we have some inspiration, we might as well write it down as an experience and let ourselves remember it, so as to develop a good summary method. So what is a good experience? The following is my experience in network security (7 general articles). Welcome everyone to learn from and refer to. I hope it helps you.
Network security experience 1 Network is a double-edged sword. It can not only benefit people, but also facilitate people to consult all kinds of information and materials; It will also bring a lot of trouble and harm to people. So be careful when using the network. Next, I will talk about my own network security experience.
We try to install more authoritative anti-virus software on the computer, kill Trojans and fix loopholes. And learn to upgrade anti-virus software in time, regularly clean up and kill malicious programs, and reduce the risks faced by computers.
When shopping online, we try to choose a regular shopping mall to avoid personal information falling into the wrong hands. When entering account information, you can use the keyboard on the screen. When using QQ, Fetion, WeChat and other chat tools, try not to expose your ID card information and bank card information. In the past, there were many frauds that stole QQ from others and borrowed money from other netizens. After all, the current network fraud technology is becoming more and more advanced, and many victims realize the importance of network security only after being fooled.
Speaking of the experience of network security, the top students in the computer department are quite touched. Nowadays, many illegal organizations cheat through the Internet. Sometimes when using a computer, a webpage pops up suddenly. There are usually attractive words or pictures on web pages, which make people fall into the trap of fraud gangs unconsciously ... so obeying laws and ethics is also one of the ways to maintain network security.
Learning the knowledge of network security maintenance is very important for protecting our personal privacy and even corporate secrets.
Experience in network security 2. A comprehensive equipment maintainer pays attention to quick response and strong support. For network security maintenance, the first thing is to enhance the awareness of network security. Be strict with yourself and constantly improve personal safety awareness and maintenance quality.
According to the big business concept of "maintenance is management" advocated by the department, the whole maintenance work closely focuses on efficiency, strengthens support for customers and markets, and makes every effort to do background support.
Gradually establish a gold and silver brand customer circuit data account, and formulate customer circuit emergency plans for gold medal customers according to their actual use of data circuits. In order to realize the classification of big customers, our center arranges to identify the circuits of big customers with plugs of different colors; In order to reflect the differentiated service for major clients, our team regularly conducts patrol inspection for major clients with gold medals, and makes monthly network operation reports for major clients.
Don't engage in individualism in daily maintenance, team strength is endless. Pay attention to cooperation and efficiency. It is necessary to strengthen the comprehensive inspection of network equipment security and standardize and accurately handle faults. This requires individuals to have strong business ability and maintenance quality. Therefore, individuals should strengthen their study and constantly improve their professional level and maintenance ability.
Network security experience. Network has become very common in modern society. We can see people using the internet everywhere. The emergence of the internet, such as the elderly, children and middle-aged people using the internet to watch movies, stock market, browse news and work, has brought people a brand-new look! With the network, people are more efficient and environmentally friendly, reducing the use of paper.
Just in line with our current environmental protection theme-low carbon, energy saving and emission reduction.
Moreover, many colleges and universities have set up computer majors to train high-end talents in this field, but perhaps they have neglected their ideological and political education when cultivating professional skills. When they can enter the society, they use their professional advantages to illegally conquer other people's websites and become a road that can never be turned back!
Indeed, the network is different from our real life, it is virtual, fuzzy, visible but intangible, and our real life gives people a real feeling.
In our real life, our activities have certain rules and regulations. In the network world, although it is virtual, it also has its own system, laws and regulations.
Here I briefly list some legal provisions on the Internet: As early as 199 1, the State Council issued the Regulations on the Protection of Computer Software, in which Article 30 (5) modifies, translates and annotates its software works without the consent of the software copyright owner or his legal transferee; (6) Copying or partially copying a software work without the consent of the software copyright owner or his legal transferee; 1994, a series of laws, regulations and rules were promulgated one after another: (1) violating the computer information system security level protection system and endangering the computer information system security; (2) Violating the international networking filing system of computer information systems; (3) Failing to report the cases in the computer information system within the specified time; (four) after being notified by the public security organ, the public security situation is not improved within the time limit; (five) other acts that endanger the security of computer information systems.
Until 1997, the Ministry of Public Security once again improved China's network security laws and regulations, clearly stipulating that those who violate laws and administrative regulations will be given a warning by the public security organs, and their illegal income will be confiscated, and a fine of less than 5,000 yuan will be imposed on individuals and less than15,000 yuan on units; If the circumstances are serious, it may be punished to stop networking or suspend business for rectification within six months, and if necessary, it may suggest that the original license issuing and examination and approval authority revoke its business license or cancel its networking qualification; If it constitutes a violation of public security administration, it shall be punished in accordance with the regulations on administrative penalties for public security; If a crime is constituted, criminal responsibility shall be investigated according to law.
Therefore, in the online world, people who break the law will be held accountable.
This is the same as our real life, not as we imagined, because the online world is virtual, so we can talk nonsense.
If spreading pornographic information is not conducive to social stability, it will be punished. For those who use their superb technical means to invade other people's computer systems for profit, it is definitely illegal. We often see such cases in real life. It should be said that these cases have taught us a bloody lesson. Therefore, when using the network, we must abide by laws and regulations, do not engage in sabotage, conduct normal and healthy communication on the network, make full use of network resources, and improve learning efficiency and knowledge!
Experience of network security 4 Have you recently received a WeChat message "The mother who robbed the child at the intersection of South Gate in Li Antang was stabbed"? Are you imagining things?
It is conceivable that the picture at that time was so bloody! How horrible! Criminals in disguise, lurking at the intersection of South Gate of Li Antang, quietly waiting for the child to take the bait. Suddenly, the target appeared. A young mother is playing in the street with a child. Just when the mother was not paying attention, the child was suddenly pulled by a pair of rough big hands. That's a criminal! At this time, my mother found the figure of the gangster and rushed forward, trying to fight with the gangster with meager strength! Who knows, the gangster took a sharp knife out of his pocket and stabbed his mother! A river of blood, panic. ...
However, this is just a false news! According to the investigation of Nan 'an Public Security Bureau, there is no such case in Meixi Street, Nan 'an. This information is purely a rumor!
With the rapid development of science and technology, people can't live without the ubiquitous universal and practical Internet. However, the network is like a new xxx. If it is used improperly, it is very likely that rolling in the deep will be irretrievable. Therefore, network security can not be ignored!
When you sent a message to your friends happily on your mobile phone, did you receive the winning information from strangers? The prize is a high-tech product with priceless value, and the bonus amount is as high as 10 million! You must never smile. If you didn't buy lottery tickets and participate in any prize-winning activities, where did these prizes and bonuses come from? Obviously, it is a scam designed by a liar using people's subtle psychology! It's obviously a clumsy scam, why are people still cheated? Believe in good things that fall from the sky? Nothing in the end? Either this kind of person is too kind and believes in the internet; Either this kind of person is too stupid and has no awareness of internet security!
Friends, the network containing bad information has seriously affected people's lives, but we must not fall into it! Always remind yourself that network security cannot be ignored!
Experience of Network Security On the afternoon of May+February 2/KLOC-0, 65438, I had the honor to participate in the electromechanical training organized by the monitoring and command center with the theme of network security. This training is divided into two parts: technical lecture on network security status analysis and technical lecture on Internet of Things and big data security solutions. I invited Mr. Wang, a network security engineer from Rising, to give a lecture. The training mainly includes the following parts: analyzing the current situation and existing problems of the network security industry in detail, focusing on explaining why 20xx is the most historic year of the network security industry, explaining the technical development trends and hot events in the most concise language, and how to defend the privacy of data in the new era of Internet of Things and big data. Through Mr. Wang's careful explanation, I feel that it is a long way to go to ensure the safe operation of the toll station network. At the same time, I felt the rapid development of the Internet of Things, and also deeply realized the upgrading of computer technology. Have a further understanding of the safety awareness that mechanical and electrical personnel should have.
Although the training lasted only two hours, we not only learned valuable experience and skills in protecting network security, but also felt the ardent expectations of leaders for our electromechanical personnel. We should not only master the mechanical and electrical equipment of this station, but also think more, be good at finding hidden dangers in work and draw inferences from failures.
I benefited a lot from this training. During the training, engineers abandoned the indoctrination of technical terms, took the recent hotspot of "network security" as an example, interspersed with their own experience in maintaining network security, and used humorous language to gradually penetrate "Internet of Things security", "cloud computing and big data security", "artificial intelligence" and "data security protection architecture V2" into the minds of American electromechanical personnel.
Because most of our mechanical and electrical engineers have just been admitted, they have some shortcomings in some aspects, so we must improve our quality in an all-round way and practice our excellent skills. First, we should study hard, deeply understand the laws and regulations of the network security law, improve the awareness of network security, and fully infiltrate the awareness of network security into our work. Second, make a good backup and plan ahead. Important data files should be backed up in time to minimize the losses caused by possible virus damage in the future. Third, we must do a good job in prevention. Do not insert other pluggable media such as USB flash drive into the charging mechanical and electrical equipment at will. Use the latest antivirus software and update the virus database in time, otherwise the antivirus software will be useless. In addition, it is necessary to correctly set up various functions of anti-virus software and give full play to its efficacy.
Through this training, I not only broadened my thinking, let me further understand the importance of network security, but also let me feel the attention of leaders at all levels to our station mechanics. In my future work, I will definitely keep in mind my responsibilities as an electromechanical member, play my due role as an electromechanical member in ordinary posts, and strive to contribute to the healthy development of Shi 'an Expressway.
20xx attended the campus network security training meeting held by Sichuan Normal University from April 8th to June 4th/KLOC-0. In order to improve the information literacy and professional skills of campus network administrators and information technology teachers in primary and secondary schools in Panzhihua City, and better apply information technology to education and teaching, this training meeting is specially held. The training lasts for seven days, mainly including basic knowledge of network, equipment management, layer 2 switches, Layer 3 switch, vlan, dhcp, arp, spoofing, router configuration, integrated wiring, information security, database recovery and network attack and defense learning. After a week of training and experimental operation, I learned a lot of new ideas that I had never been exposed to before, and completely solved some thorny problems in the current campus network. The following are some main experiences of this training.
First of all, I learned to build a campus website.
I also benefited a lot from website construction. I know how to set up WEB and FTP sites, and I also know that in the same intranet, multiple domain name sites can use port 80 at the same time as long as they set the host header. Build a website in ASP.net by yourself. I also learned how to manage remotely through the remote desktop, which brought great convenience to the management of the machine.
Secondly, I learned how to solve arp problems by using routes and switches.
Setting up a router optimizes the management of the router to the greatest extent. After learning the configuration of the router, the IP address of each teacher is better divided, so that the name corresponds to the machine name and the MAC address is bound, which prevents the spread of ARP virus and enables the management of by going up one flight of stairs.
Third, learn the latest knowledge of network security.
I have gained a lot from the security of the website. There are many loopholes in website management, such as using the same user name and password, having too much authority over website folders, having no defense against website database files, posing a great threat to the website, even the whole network and server, and even becoming a "broiler chicken" for hackers to operate at will.
Fourthly, I learned the common commands of routers and other devices.
Router configuration experiment. First, complete the physical connection of router, computer and switch, and then log in to the router with HyperTerminal and set it up. Other students in this group use Telnet command to log in and use various commands. Finally, four routers are connected into a small Internet through Ethernet interface.
5. Besides, I also learned a little knowledge.
Settings of routers and switches, VLAN divisions, etc. In addition, clone PC in virtual software, configure virtual machine and resolve domain name.
When configuring the switch, divide the Vlan. The key is that after the configuration is written to the switch, it must be powered off and restarted before the new configuration can take effect (the same is true for routers).
In the process of subnetting, 1 was mistakenly taken as the initial unit, which made many theoretically unavailable addresses become regular addresses, actually 0 ~ 255.
Finally, I sincerely thank Panzhihua Education Bureau and Audio-visual Education Center for giving me this opportunity to study, and thank the teachers of Sichuan Normal University for their guidance. I will definitely bring the things and ideas I learned this time to the school network security work, and make due contributions to the campus network security and campus information construction in Panzhihua City.
Network Security Experience On July 6th, 7xxxxx, 16, I was lucky enough to attend the network security training organized by the Education Bureau for eight days. The students participating in the training are all network management experts or network management experts of various schools, and the training teachers are either gold medal lecturers or senior technicians of a company. In such a learning environment, it not only drives me to enter the teaching profession, but also makes me feel that it is not easy to be a network administrator for the first time. Through this training, I deeply realized that I have a lot to learn, so I can only apply what I have learned in my own work, turn theoretical knowledge into practical operation, and realize my life value.
First, arm your mind with theoretical knowledge.
In this training, half the time the teacher mainly talks about the theoretical knowledge of network security, laws and regulations, network security management and network security technology. Starting with theoretical knowledge, let us have an understanding of network security knowledge. Although theoretical knowledge is a bit boring, I clearly know that this is the foundation. Through the study a few days ago, I learned that we should first pay attention to the importance of network security, fully understand the network security management problems in our school, face up to the problems, and solve and implement network security. Make the daily work of the campus go on in an orderly and normal way. Secondly, the problem of network security depends on the efforts of everyone, not just one person. The campus itself is a team and a collective. Of course, all teachers and students need to work together. First, every teacher should have a sense of network security, and second, make the network more stable through technical means. In short, the training has made me further aware of the shortcomings and future work direction, and I will learn more and think more.
Second, develop the study habit of doing more, talking more and thinking more.
In addition to learning theoretical knowledge, I also learned a lot in the training, most of which are computer operations, such as the configuration of switches and routers, because during my college years, I didn't touch switches and routers, but I just heard of them and never saw them. Through training, I not only learned about them, but also configured them. During my study, I listened carefully and discussed with the teacher some questions I didn't understand, so I learned a lot. Because I deeply feel that computers can only be understood by their own operation and groping, I have always reminded myself to learn and think in computer operation training. Thanks to my efforts, I learned the mutual access between computers and some basic security configurations. But I still want to point out my shortcomings in this training. I still don't understand the wiring system I learned. Maybe it has nothing to do with me. Besides, I don't know my campus wiring. It's hard to learn. But I learned from it.
Through this training, I believe I have made some progress, no matter in what way or how much. I just need to work hard to realize it in the future and do my little bit. In order to realize their own value.