National computer network Yu information security management center Fujian branch

Legal subjectivity:

Computer network security includes two aspects, namely physical security and logical security. Physical security refers to the physical protection of system equipment and related facilities to prevent damage and loss. Logical security includes the integrity, confidentiality and availability of information. First, the computer network information security management analysis 1. Software vulnerabilities At present, the software we apply is often open source in order to create conditions for subsequent debugging and optimization, which is actually the main source of software vulnerabilities. Many cyber criminals can steal users' information through these loopholes in the software itself, or do all kinds of damage, so the loopholes in the software itself are the main way for cyber criminals to steal information. 2. Virus attacks are very destructive in the network and exist for a long time, but it has been difficult to completely eliminate them. Internet is the most important way for computer virus-related manufacturers to spread, so most users who visit the network will directly face the threat of network virus attacks. Network viruses spread very fast, can spread to a considerable range in a short time, and may occupy a lot of network bandwidth, making it difficult to use traffic normally. 3. Relevant personnel have poor awareness of prevention. For computer managers, their safety awareness often has great problems. They often use their birthdays, student numbers and work numbers as passwords directly, and sometimes lend their company accounts to others at will. Many computer managers are not correct in attitude, do not work conscientiously and meticulously, and there are also great problems in the standardization of operation processes, which also creates opportunities for network criminals and has a serious impact on network information security. Once the information is tampered with or lost, economic losses are inevitable. 4. Problems in users' use Many users, when planning their daily use of computer networks, are likely to cause security loopholes if their professional level is insufficient or their security awareness is poor. For example, if firewall software is not installed or configured correctly, it will pose a threat to the operation of the whole computer network. At the same time, many users have poor security awareness. Lending their accounts to others may cause problems and threaten their network security. Second, the confidentiality of computer network insecurity factors: the characteristic that information is not leaked to or used by unauthorized users, entities or processes. Integrity: the characteristics of data cannot be changed without authorization. In other words, information remains unchanged, not destroyed or lost during storage or transmission. Availability: Functions that authorized entities can access and use as needed. That is, whether the required information can be accessed when needed. For example, denial of service in the network environment, destroying the normal operation of the network and related systems, are all attacks on usability. Controllability: the ability to control the dissemination and content of information. Auditability: provide basis and means when security problems occur. Network technology has brought us great convenience, but on the other hand, due to its security loopholes, we must improve our security awareness. However, how to use specific technical means to solve the existing security problems still needs our efforts.