1, natural disasters, accidents;
2. Computer crime; ?
3, human behavior, such as improper use, poor safety awareness;
4. Hacking behavior: due to the invasion or intrusion of hackers, such as illegal access, computer virus denial of service, illegal connection, etc. ;
5. Internal leakage;
6. External leakage;
7. Loss of information;
8. Electronic espionage, such as information flow analysis and information theft;
9. Defects of network protocols, such as security issues of TCP/IP protocol.
Extended data:
Computer network security measures mainly include three aspects: protecting network security, protecting application service security and protecting system security. All aspects should be combined with physical security, firewall, information security, Web security, media security and so on.
1, protect network security.
Network security is to protect the security of communication process between network-side systems of all business parties. Ensuring confidentiality, integrity, authentication and access control is an important factor in network security. The main measures to protect network security are as follows:
(1) Overall plan the security strategy of the network platform.
(2) Formulate network security management measures.
(3) Use a firewall.
(4) Record all activities on the network as much as possible.
(5) Pay attention to the physical protection of network equipment.
(6) Test the vulnerability of the network platform system.
(7) Establish a reliable identification and discrimination mechanism.
2. Protect application security.
Protecting application security mainly refers to the security protection measures established for specific applications (such as Web servers and online payment special software systems), which are independent of any other security protection measures of the network. Although some protection measures may be the substitution or overlap of network security services, such as the encryption of network payment and settlement packets by Web browsers and Web servers at application level, all of which are IP layer encryption, many applications have their own specific security requirements.
Because the application layer in e-commerce has the strictest and most complicated requirements for security, it is more inclined to take various security measures at the application layer than at the network layer.
Although the security of network layer still has its special position, people can't rely on it to solve the security problem of e-commerce application. Security services on the application layer can involve authentication, access control, confidentiality, data integrity, non-repudiation, Web security, EDI and network payment.
3. Protect the system security.
Protecting system security refers to security protection from the perspective of the overall e-commerce system or online payment system, which is interrelated with the hardware platform, operating system and various application software of the network system. System security involving online payment and settlement includes the following measures:
(1) Check and confirm unknown security vulnerabilities in installed software, such as browser software, e-wallet software, payment gateway software, etc.
(2) The combination of technology and management makes the system have the minimum penetration risk. If the connection is allowed after multiple authentications, all the access data must be audited and the system users must strictly manage it.
(3) Establish detailed security audit logs to detect and track intrusion attacks.
References:
Baidu Encyclopedia-Network Security