Experience of learning network security (three articles)

Experience of learning network security (three articles)

Chapter 1: Overview of learning network security

Overview of learning network security

For network security, compared with me, before I came into contact with this course, it was a loophole and a blank, and my awareness of network security was very weak. I have heard of cyber attacks, stealing information, stealing passwords, checking personal privacy and other illegal acts that persecute the network security order, which also made me afraid of the network. This time, I was lucky enough to contact the course of network security, which also gave me a new understanding and more understanding of network security, and also benefited me a lot. Network security is essentially information security on the network, which refers to the security of network system hardware, software and data in the system. The transmission, storage, processing and use of network information are all required to be visible in a safe state. Network security should at least include static security and dynamic security. Static security refers to the confidentiality, integrity and authenticity of information content without transmission and processing; Dynamic security means that information will not be tampered with, stolen, lost or destroyed during transmission. In fact, the specific meaning of computer network security will change with the change of users. Different users have different understanding and requirements for network security.

For example, from the perspective of ordinary users, they may just want personal privacy or confidential information to be protected when transmitting on the network to avoid eavesdropping, tampering and forgery; In addition to the security of these network information, network providers should also consider how to deal with the destruction of network hardware caused by sudden natural disasters and military strikes, and how to restore network communication when the network is abnormal and maintain the continuity of network communication. Network security has both technical problems and management problems, which complement each other and are indispensable. With the large-scale popularization and application of the Internet, network security issues are also presented to us. Threats such as virus penetration, system vulnerabilities, and hacker attacks emerge one after another, which have seriously affected the normal operation of the network. The continuous expansion of network scale poses a more severe challenge to network security guards. The limitation of manpower, material resources and financial resources determines that it is impossible to completely rely on manual methods for security analysis and prevention. Therefore, how to adopt faster, more convenient and more effective methods for attack analysis has become an important topic of network security. With the rapid development of computer technology, information network has become an important guarantee for social development. Many of them are sensitive information, even state secrets. So it will inevitably lead to all kinds of man-made attacks from all over the world (such as information leakage, information theft, data tampering, data deletion, computer viruses, etc.). ). At the same time, network entities have to withstand the tests of floods, fires, earthquakes and electromagnetic radiation. Computer crime cases have also risen sharply, and computer crime has become a common international problem. According to the report of the Federal Bureau of Investigation, computer crime is one of the biggest types of commercial crimes.

The threat of computer network security is a serious threat. Due to the diversity of computer networks, the wide distribution of terminals and the openness and interconnection of networks, networks are vulnerable to attacks by hackers and malicious software. Common computer network security threats mainly include: information leakage, integrity destruction, denial of service and network abuse.

Information leakage: Information leakage destroys the confidentiality of the system, which means that information is leaked to unauthorized entities. Common threats that may lead to information leakage include: network monitoring, business flow analysis, electromagnetism, radio frequency interception, intentional or unintentional personnel, media cleaning, exploitation, authorized infringement, physical invasion, virus, Trojan horse, back door, rogue software and phishing.

Integrity destruction: it can be achieved by using vulnerabilities, physical violations, authorization violations, viruses, trojans, vulnerabilities, etc.

Denial of service attack: Access to information or resources that can be legally denied or time-related operations are delayed.

Network abuse: legitimate users abuse the network and introduce unnecessary security threats, including illegal external connections, illegal internal connections, mobile risks, equipment abuse and business abuse.

The common forms of computer network security threats mainly include eavesdropping, forwarding, forgery, tampering, denial of service attack, behavior denial, electronic deception, unauthorized access and virus spread.

Eavesdropping: Attackers obtain important information by monitoring network data, which leads to the disclosure of network information. Retransmission: The attacker obtains some or all information in advance and sends it to the receiver later.

Tampering: The attacker modifies, deletes and inserts the communication information between legitimate users, and then sends the forged information to the receiver, which is pure information destruction. This kind of network infringer is called active infringer. Active attackers do the most damage.

Denial of service attack: the attacker slows down or even paralyzes the system response in some way, preventing legitimate users from obtaining services. Behavior denial: the communication entity denies the behavior that has happened.

Electronic deception: Attacking the Internet by pretending to be a legitimate user, so as to cover up the true identity of the attacker and frame others.

Unauthorized access: Using network or computer resources without prior consent is regarded as unauthorized access. Spreading virus: spreading computer virus through the network is very destructive and it is difficult for users to guard against it.

Common network attacks are: Trojan horse, mail bomb, overload attack, flooding attack, ping attack, etc. Therefore, network security is a dynamic and comprehensive system engineering. Technically speaking, network security consists of several security components, such as secure operating system, application system, antivirus, firewall, intrusion detection, network monitoring, information audit, communication encryption, disaster recovery, security scanning and so on. A single component cannot guarantee the security of information network. 1, antivirus technology. In order to avoid losses caused by viruses, a multi-layer virus defense system can be adopted. That is, install stand-alone antivirus software on each computer, install server-based antivirus software on the server, and install gateway-based antivirus software on the gateway. Let every computer not be infected by virus, so as to ensure that the whole enterprise network is not infected by virus. Because viruses are stored, spread and infected in different ways in the network, anti-virus products of all-defense enterprises should be used when building a network anti-virus system, and the strategy of layer-by-layer defense, centralized control, prevention first and combination of prevention and killing should be implemented. 2. Firewall technology. Firewall technology is an important network security technology developed in recent years. Its main function is to check the network communication at the entrance of the network, and ensure the internal and external network communication according to the security rules set by users on the premise of protecting the internal network security. After installing a firewall at the network exit, the firewall can effectively isolate the internal network from the external network, and all access requests of the external network must be checked by the firewall to improve the security of the internal network. 3. Intrusion detection technology. Intrusion detection system is a new network security technology that has emerged in recent years. Its purpose is to provide real-time intrusion detection and take corresponding protective measures, such as recording evidence for tracking and recovery, and disconnecting the network connection. Real-time intrusion detection ability is very important because it can deal with attacks from internal and external networks. If an intrusion detection system is installed on the network segment of the host that needs to be protected, it can monitor all kinds of access requirements to the host in real time and feed back the information to the console in time, so that the system can find any host in the whole network in time when it is attacked. 4. Security scanning technology. Security scanning technology combined with firewall and intrusion detection system can effectively improve the security of the network. By scanning the network, the network administrator can know the security configuration and running application services of the network, find security vulnerabilities in time and objectively evaluate the network risk level. Network administrators can correct network security vulnerabilities and misconfiguration in the system according to the scanning results, and take precautions before hackers attack. If firewall and network monitoring system are passive defensive measures, then security scanning is active preventive measures, which can effectively avoid hacker attacks and nip in the bud. Security scanning tools originated from the tools used by hackers to invade network systems, and commercial security scanning tools provide strong support for the discovery of network security vulnerabilities. 5. Network security emergency response system. As a dynamic project, network security means that its security degree will change with time. Today, with the rapid development of information technology, it is necessary to constantly adjust its own security strategy with the change of time and network environment or the development of technology, and establish a network security emergency response system in time, with a special person in charge to prevent the occurrence of security emergencies.

In the era of network information, network security has been paid more and more attention. Although there are many products used for network security protection, hackers are still pervasive, causing serious harm to society. The fundamental reason is that the security risks of the network itself cannot be eradicated, which makes it possible for hackers to invade. Nevertheless, with the improvement of network security technology, the possibility of hacker intrusion is reduced, and the security of network information is guaranteed. This also depends on the unremitting efforts of network security personnel. I hope that one day, every netizen will not have to worry about network security, and the online world will be orderly.

Chapter 2: Learning experience of communication network security.

Learning experience of network security

Communication network security involves thousands of households in all walks of life, especially our front-line engineers, which is not only related to our own interests, but also to the interests of the company. With the rapid development of communication industry, manufacturers and operators have higher and higher requirements for network construction and maintenance, and the importance of safe production is also higher and higher. This requires us to enhance our awareness of safety standards in our daily work and realize the importance of safe production to engineering safety. In recent years, group companies and companies have paid more and more attention to safety and environmental protection, and their requirements have become more and more strict. It can be said that under the current situation, security is politics, the overall situation, stability, harmony and an unshirkable responsibility. Therefore, as grass-roots employees, we should fully realize this, constantly improve our understanding of safety and environmental protection work, and enhance our sense of urgency and responsibility in doing a good job in network security. Deeply understand that "safety is a veto indicator, operation is a planned indicator, and energy saving and consumption reduction is a constraint indicator", and do a good job in safety construction from its own perspective.

In view of the fact that there are more and more projects in the company, and the management is not in place, which leads to high-risk events, Zhangzhou holds a regular meeting of employees in the whole region every week to think deeply about the accidents and find out the reasons. As an individual, although I have never been exposed to the high-voltage line of engineering construction, I will learn from the past and encourage myself.

First of all, we should make clear the operation process specification and potential risk impact, do a good job in risk avoidance measures, and strictly follow the implementation plan to carry out the work. For engineers, process specifications and systems are the most important, but they are also the most prone to problems. This requires us to pay attention to the study of safety production at ordinary times, form the habit of safety production norms, read the construction process and the work content carefully before starting work, be more responsible and implement it conscientiously, and avoid the occurrence of safety production accidents from the root. The alarm bell is ringing, always thinking about the consequences of these operations, whether our early warning measures are in place and so on. Look before you leap and put safety in production first, and our work will be better.

Another important aspect of safe production is personal safety. The impact of personal safety accidents is far greater than that of equipment safety accidents. Therefore, it is necessary to strengthen the preventive measures for personal safety at work, and to operate step by step in strict accordance with the engineering construction specifications, and not to despise any subtle work. This is responsible for our work and our own life. While improving the safety system, strengthen safety awareness and responsibility awareness, and fundamentally put an end to safety accidents.

Chapter 3: Learning experience of computer and network information security.

Learning experience of computer and network information security

By studying computer and network information security, I have a deeper understanding of the importance of network information security. Network information security is an important condition to protect the integrity and confidentiality of personal information. Only by understanding the basic knowledge of network information security can we understand the importance of network information security in today's information age!

In today's information age, each of us needs to keep up with the pace of the times, so we don't lack the use of computer information tools, so we need to understand the benefits and risks of the network, both advantages and disadvantages. We need to minimize disadvantages and make rational use of advantages, so that we will not fall behind in the network age. Now everyone's information will be online, depending on how you protect your information. Will your personal computer be hacked? Will your registered member website reveal your information? Wait! These can be regarded as a part of network information security.

After studying, I realize the importance of network security more, because each of us is basically using computers. Has the personal computer been attacked by hackers and viruses? Everyone's personal computer will store a lot of personal information and important text files, so in order to ensure the security of these text information from being tampered with, we need to have a deeper understanding of the importance of network information security, and constantly learn and improve our network security skills, so as to protect our own network information security. For example, our personal computer may have inadvertently shared many of our important files with * * *. In fact, you don't want everyone to know your secret file, but you just don't know how to share it with * * *. Many hackers can easily invade your personal computer, so we need to know more about the basics of network security.

In addition, there are many cybercrime cases in our daily news, all of which are the disclosure of personal information. Either the password of personal online banking is stolen, or it is a crime of personal information disclosure on the Internet, so these are all things we need to pay attention to. Nowadays, with the continuous development of third-party payment platform and online retail, we need to improve our understanding of computer network information security, especially the study of computer specialty, which puts forward new requirements. That is to say, we should have rich knowledge of network information security. We only know that the encryption of text is not enough. We need to make progress with the progress of the times, so we need to further improve our information security knowledge while understanding the basic knowledge of computer network security.

Network information security requires a simple understanding of file encryption and decryption, virus protection, personal network settings, encryption and decryption technology, personal computer security protection, network leakage in life and inadvertent personal information leakage, etc. Sometimes our personal information is leaked by ourselves, but we don't pay attention to it. I

Learning experience of network security

Our strangers can simply get your personal data through your personal homepage and your online comments, and you will inadvertently explain your urban community. These all appear inadvertently, so your carelessness may be used by others, so we need to pay attention to the protection of words and personal information in the network information age and raise our awareness of protection!

Each of us will encounter many problems in the information age, which also varies from person to person! Then briefly explain the problems I encountered:

1, I don't know how to do routine maintenance when I use the computer for the first time, such as

I can't guarantee that my computer won't be infected with viruses, but I understand learning in reality.

Because we can share a lot of knowledge online in the information age, now I can solve simple problems by myself;

2. When using the computer, the registry of some software is lost. I don't know what happened.

I still don't understand why it doesn't work properly. Ask the teacher for help!

3. The system software always runs slowly, but it still can't be used after being optimized by the anti-virus system.

Too much influence, when the software starts, it will always affect the running speed of the computer, and even cause the computer to temporarily crash;

4. When opening some webpages, IE browser will fail to load and need to reload the webpages.

Load or restore a web page;

5. If the computer suddenly crashes or loses power and your information is not completely saved,

Can we still find it? How to get it back?

6. Files deleted by mistake need to be retrieved, and the recycle bin has been emptied. How do we recover the data?

In the future, I hope to communicate with my teacher more if I have any questions, because my computer is more interested, but I don't know much, and there are still many shortcomings. I hope the teacher can guide me!