1, system security
Operating system security refers to ensuring the security of information processing and transmission system, with the emphasis on ensuring the normal operation of the system. Avoid the destruction and loss of messages stored, processed and transmitted by the system due to the crash and damage of the system. Avoid information leakage, interference or interference from others caused by electromagnetic leakage.
2. Network security
The security of system information on the network includes user password authentication, user access control, data access control, mode control and security audit. Security issues followed. Computer virus prevention, data encryption, etc.
3. Information dissemination security
The security of information dissemination on the network refers to the security of the consequences of information dissemination, including information filtering. The key point is to prevent and control the consequences caused by the spread of illegal and harmful information, and to avoid the uncontrolled information circulating freely on public networks.
4. Information content security
The security of information content on the network focuses on protecting the confidentiality, authenticity and integrity of information. Avoid attackers using the security vulnerabilities of the system to eavesdrop, impersonate, cheat and other behaviors harmful to legitimate users. Its essence is to protect the interests and privacy of users.
Extended data:
Tools for maintaining network security include local or cloud-based VIEID, digital certificate, digital signature, antivirus software, etc.
1, Internet firewall
It can enhance the security of an organization's internal network. Internet firewall is responsible for managing the access between the Internet and the internal network of the organization. When there is no firewall, every node on the internal network is exposed to other hosts on the Internet, which makes it vulnerable to attacks. This means that the security of the intranet is determined by the firmness of each host, and the security is equal to the weakest system.
2. Video
In this network ecosystem, every network user can trust each other's identity, and network users can also choose whether they have electronic identification. In addition to increasing network security, electronic identity recognition also allows network users to create and apply more credible virtual identities, so that network users can remember fewer or even no annoying passwords.
3. Digital certificates
CA Center adopts digital certificate authentication technology with digital encryption technology as the core. Through digital certificate, CA center can encrypt, decrypt, digitally sign and authenticate all kinds of information transmitted on the Internet, and at the same time, it can ensure that it will not be invaded by lawless elements during digital transmission, or even if it is invaded, it will not be able to view its contents.
Baidu Encyclopedia-Network Security