A brief discussion on network security and information techn

2018-06-09 09:32 编辑:admin 来源:代写论文 浏览:
With the rapid development of Internet technology in recent years, network complete technology has affected various fields such as society, economy, culture and so on. In the process of continuous maturity, network technology makes network connection easier. While people are enjoying the convenience of the network, the security of the network is gradually gaining power. Coerced. The security of the whole network is also easy to be overlooked.
 1. the meaning of network security
The 1.1 meaning of network security is the sum of measures taken to protect the network from being infringed. When the network security measures are adopted correctly, the network can be protected and run normally.
It has three aspects: (1) confidentiality: the network can prevent unauthorized users from reading confidential information. Completeness: including completeness of data and completeness of software. Completeness of data means that information is not deleted or modified without permission. The integrity of software is the modification of users or viruses that ensure that software programs will not be mistaken or cherished. Availability: it means that the network can ensure legitimate access to authorized access to the system when attacked.
1.2 characteristic network security, according to its essence, should have the following basic characteristics: (1) confidentiality: it means that information is not leaked to unauthorized individuals, entities and processes, or for their use. Integrity: refers to the characteristics that information can not be modified without authorization, not destroyed, not entered, not delayed, unordered and not lost. (3) availability: refers to the characteristics that the authorized user can use in a normal order, that is, to ensure that the authorized user can access and query the data when it is needed.
 2. status of network security
The current development of the network has been quite different from the original design of the original design network, security issues have been in a very important position, if the security problem can not be solved, it will seriously affect the application of the network. Network information has many characteristics that are not conducive to network security, such as network interconnection, sharing, openness, and so on. Now more and more malignant attacks show that the network security situation is severe, the means of the illegal elements are becoming more and more advanced, and the system's security leakage often gives them the opportunity to take advantage of the network. Network security precautions should be able to deal with different threats and ensure the confidentiality, integrity and availability of network information.
3. network security solution
To solve the problem of network security, we must first clear the objectives: (1) identity authenticity: identifying the authenticity of the identity of the communication entity. Information confidentiality: ensure that confidential information is not leaked to unauthorized persons or entities. Information integrity: ensure consistency of data and prevent any unauthorized user or entity from damaging data. Service availability: prevent legitimate support from improper rejection of information and resource usage. (5) non repudiation: establishing effective responsibility and wit to prevent entities from denying their actions. System controllability: the ability to control the use of resources by people or entities. System usability: the system should be easy to operate and easy to maintain in order to meet the safety requirements. Censorship: provide the basis and means for investigating the problem of network security.
 4. how to guarantee the security of network information
Network security has a safe operating system, application system, anti-virus, firewall, intrusion detection, network monitoring, information audit, communication encryption, disaster recovery, security scanning and other security components, a single component is unable to ensure the security of the information network. From the perspective of practical operation, network security should pay attention to the following technologies:
4.1 antivirus technology. Viruses are rampant because of the Internet and the greatest threat to computer system security. We should take a comprehensive range of enterprise anti-virus products, and implement the strategy of layer defence, centralized control, prevention and combination of prevention and killing.
4.2 firewall technology. It usually refers to a combination of components set up between different networks (such as trusted enterprise intranets and untrusted public networks) or network security domains (including hardware and software). It is the only entry and exit of information between different network or network security domains. It can control (allow, reject, monitor) the information flow in and out of the network according to the security policy of the enterprise, and it has strong anti attack ability. It is the infrastructure to provide information security services and realize network and information security. Firewall is an effective means to protect the network from hacker attacks, but it also has obvious shortcomings: it is impossible to prevent the attack from other ways outside the firewall, and can not prevent the threats brought from the inward and unauthorized users, and can not completely prevent the transmission of the infected virus software or files, as well as the absence of the virus. The law prevents data - driven attacks.
  4.3 intrusion detection technology. Intrusion detection helps the system to deal with network attacks, expand the security management ability of system administrators, and improve the integrity of information security infrastructure. It monitors the network without affecting the network performance, thus providing real-time protection for internal attacks, external attacks and misoperation. The specific task is to monitor and analyze user and system activities; system construction and audit of weaknesses; identify the scale and alarm of the offensive activities; statistical analysis of the abnormal behavior patterns; evaluate the integrity of the important system and data files; the audit tracking management of the operating system, and identify the user's behavior of violating the security policy.
4.4 security scanning technology. This is another kind of important network security technology. Security scanning technology and firewall, intrusion detection system three to cooperate with each other, to improve network security is very effective. Through the scanning of the system and the network, the system and the network environment can be evaluated as a whole, and the security risk level of the network can be obtained, and the security loopholes in the system can be found in time, and the security of the system can be repaired automatically. If firewall and network monitoring system are passive defense means, security scanning is a kind of active preventive measures to prevent the unexpected.
4.5 network security emergency response system. As a dynamic project, network security means that its security level will change with time. With the change of time and network environment or the development of technology, the security strategy is constantly adjusted, and the emergency response system of network security is set up in time, and the special person is responsible to prevent the emergency.
4.6 security encryption technology. The emergence of encryption technology provides a guarantee for global e-commerce, thus making it possible for the electronic trading system based on Internet. Therefore, perfect symmetric encryption and asymmetric encryption are still the mainstream in the twenty-first Century. Symmetric encryption is a conventional password based technology, and encryption and decryption operations use the same key. Asymmetric encryption, that is, the encryption key is different from the decryption key, the encryption key is made public, anyone can use it, and the decryption key is decrypted only by the person himself. The operating system security and physical security measures of network hosts. Firewall, as the first line of defense of the network, can not completely protect the internal network, so we must combine other measures to improve the security level of the system. Behind the firewall is the operation system security and physical security measures based on the network host. According to the level from low to high, it is the physical security of the host system, the kernel security of the operating system, the security of the system service, the security of the application service and the security of the file system, and the security check of the host, the repair of the vulnerability and the security of the system backup as the auxiliary security measures. These constitute the second line of security of the entire network system, mainly guarding against some breakthroughs in firewalls and internal attacks. System backup is the last line of defense of network system, which is used for system recovery after attack. After the security measures of the firewall and the host, it is a global security check and response measure composed of system security audit, intrusion detection and emergency processing machine. It extracts the network state information from the firewall in the network system, the network host and even the network link layer directly, and provides the intrusion detection subsystem as the transmission person. The intrusion detection subsystem determines whether there is an intrusion in accordance with certain rules. If there is an intrusion, emergency treatment measures are started and warning information is generated. Moreover, the system security audit can also be used as a source of information to deal with attacks and consequences, and to improve the security strategy of the system.  
1 concept of network information security
1.1 information security
Prevent any unauthorized access to the data, or prevent the occurrence of information, such as accidental disclosure, destruction, loss, and so on, to keep the data in a state or property that is far away from danger and threat.
1.2 network security
Information security in the computer network environment.
2 elements of network information security
(1) integrity: information is not destroyed by accident or deliberate deletion, modification, forgery, disorder, replay, insertion, and so on. Information is not modified or destroyed during storage or transmission, and there is no loss or disorder of packets.
(2) confidentiality: data encryption, access control, and computer leakage prevention are the most important features of the control of information resources.
(3) availability: authorized entities can access resources and services when needed. Availability means that whenever the user needs, the information system must be available, that is to say, the information system can not refuse service. With the development of the information age, the concept and connotation of the computer network information security are constantly evolving, because the starting point and the focus are different, so the conclusions are not the same. Besides, in the case of a specific security application, these concepts of information security may not contain all situations.
3 factors that destroy network security
3.1 human factors and natural disaster factors
(1) human factors refer to human invasion and attack, and disrupt the normal operation of the network system. Some "hackers" use the convenience of computer viruses to spread in the network, destroy units or individual computer systems, steal secret information and account passwords, and engage in various illegal and criminal activities.
(2) natural disaster factors mainly refer to the damage of fire, flood, storm, lightning and earthquake, as well as the influence of environment (temperature, humidity, shock, impact, pollution). The characteristics of such unsafe factors are sudden, natural and non targeted. This insecurity has the greatest threat to the integrity and availability of network information, but less on the secrecy of the network information, because in general, the physical destruction will destroy the network information itself. The effective way to solve such hidden dangers is to take various protective measures, make safety regulations, and backup data at any time.
(3) the insecurity factors that cause the hidden danger of network system because of the hidden danger of the network are: the vulnerability of the network operating system, the vulnerability of the security of the database management system, the sharing of the network resources, the computer virus and so on.
3.2 the vulnerability of network operating system
Network operating system is the most basic software of computer network. Transfer files on the network, load and install programs, including executable files; it can create processes, even can be created and activated remotely on network nodes; there are some daemons in the operating system, in fact, some system processes, which are always waiting for some conditions; the operating system provides Remote Procedure Call (RPC) service, but the security verification function is limited; the operating system provides network file system (NetworkFile System, abbreviated NFS) service, NFS system is a RPC based network file system. The Daemon software in UNIX and WindowsNT is actually a number of system processes, and they are usually always waiting for some conditions to appear, and if the required conditions appear, the program will continue to run. This kind of software is seen and utilized by hackers. What is more worrying is that the Daemon software has the same authority as the core software of the OS.
3.3 security vulnerability of database management system
Because database management system (DBMS) management of database is based on the concept of hierarchical management, we can see the security of DBMS. In addition, there are many interfaces between the DBMS and the network operating system, and its security must be matched with the operating system. This is a congenital deficiency, and it is hard to avoid the prevention by the day only. Because DBMS is running on the operating system, this security weakness can not be overcome.
3.4 network resource sharing
The biggest advantage of the computer network system is to share the resources of the network system, and share resources such as hardware, software and data. This kind of sharing is a double-edged sword with two sides. On the one hand, it brings convenience to users. On the other hand, it also creates convenient conditions for illegal users to steal information and destroy information. Illegal users or hackers can illegally or illegally infringe on the terminal or node.
3.5 computer network virus
Because of the wide application of computer network in the work and life of modern society, the attack of computer virus to computer and network is increasing day by day, and the destructiveness is becoming more and more serious. Once the virus attacks, it can impact memory, affect performance, modify data or delete files. Some viruses can even erase hard disks or hard disk access, or even destroy computer hardware facilities. The greatest danger of viruses is that the entire network is paralyzed, and the network resources can not be accessed. This shows that the threat of computer viruses to computers and computer networks is very serious and can not be ignored.
4 Solutions
4.1 firewall technology
The firewall is a special network interconnected device which is used to strengthen the access control between networks, prevent the external network users from entering the internal network through the external network, access the internal network resources, and protect the internal network environment.
The control function of firewall is mainly to control the access of trusted address or distrust address. In the use of various network security technologies, the highest usage rate of firewall is 76.5%. Firewall has the characteristics of low price, easy installation and online upgrade, so its usage ratio is high. The firewall can monitor the communication data coming in and out of the network, so as to complete the access of only the safe and approved information, and resist the data that threatens the enterprise.
4.2 encryption technology of network information data
The emergence of encryption technology provides a guarantee for the global e-commerce, ensuring the smooth and secure electronic transactions on the Internet. It is clear that perfect symmetric encryption and asymmetric encryption are still the main tasks of the twenty-first Century. Symmetric encryption is a conventional password based technology, and encryption and decryption operations use the same key. Asymmetric encryption, that is, the encryption key is different from the decryption key, the encryption key is made public, anyone can use it, and the decryption key is decrypted only by the person himself.
In the modern society with rapid development of information technology, network security has always been a comprehensive topic. The maintenance of network information security needs not only advanced science and technology, but also the support and cooperation of all walks of life, creating and maintaining a good network environment. At the same time, the research and innovation of the network information security technology should be accelerated, and the network information resources can be more reliable and reliable service to the users.
 In our current life, network security is a comprehensive subject, involving many aspects of technology and management, including both the safety of the half body of the information system and the physical and logical technical measures. This technology can only solve the unilateral problem, not the omnipotent.