With the rapid development of computer technology, information networks have become an important guarantee for social development. There is a lot of sensitive information, even state secrets. Therefore, it is inevitable that it will attract various human attacks from all over the world (such as information leakage, information theft, data tampering, data deletion, computer viruses, etc.). At the same time, network entities must also withstand tests such as floods, fires, earthquakes, and electromagnetic radiation. With the sharp increase in computer crime cases, computer crime has become a common international problem. According to a report by the Federal Bureau of Investigation, computer crime is one of the largest types of commercial crime, with an average amount of $45,000 per crime, and the economic losses caused by computer crime are as high as $5 billion each year. Faced with so many hidden dangers in the Internet network, network security cannot be underestimated. Authoritative experts give the following definition of network security: Network security refers to the protection of the hardware, software and data in the network system, which will not be damaged, changed or leaked due to accidental or malicious reasons, and the system will run continuously and reliably, and the network service will not be interrupted. Network security is essentially the information security on the network. In a broad sense, all technologies and theories related to the confidentiality, integrity, availability, authenticity and controllability of information on the network are the research fields of network security. Network security is a comprehensive subject involving computer science, network technology, communication technology, cryptography technology, information security technology, applied mathematics, number theory, information theory and other disciplines. According to an international cybersecurity research report, the global cybersecurity market is expected to reach US$95.6 billion (RMB 595.13 billion) in 2014, and the compound annual growth rate will reach 10.3% in the next five years. By 2019, this figure is expected to reach US$155.74 billion (RMB 969.51 billion). Among them, by 2019, the global wireless network security market will reach US$15.55 billion (RMB 96.93 billion), with a compound annual growth rate of about 12.94%. "On December 29, 1996, hackers hacked into the US Air Force's global network website and arbitrarily changed its homepage. The content about the Air Force introduction and news release was replaced with a short pornographic video, and it claimed that everything the US government said was a lie. It forced the US Department of Defense to close more than 80 other military websites." If the various examples of network security abroad are too far away from us, in early 1997, a Beijing ISP was successfully hacked by hackers, and an article about how to access the Internet for free through the ISP was posted in the "Hackers and Decryption" discussion area of Tsinghua University's "Shuimu Tsinghua" BBS station. The heavy losses caused by network security in China are enough for us to sound the alarm for network security. In summary, network security should have the following four characteristics: Confidentiality: The property of information not to be disclosed to, or made available to, unauthorized users, entities, or processes. Integrity: The property that data cannot be changed without authorization. That is, the information remains unchanged, undamaged or lost during storage or transmission. Availability: The property of being accessible to authorized entities and used as required. That is, whether the required information can be accessed when needed. For example, denial of service in a network environment, disruption of the normal operation of the network and related systems, etc. are all attacks on availability; Controllability: The ability to control the dissemination and content of information. The Internet is a double-edged sword. If it is not handled properly, it may even affect the stability of the national regime. General Secretary Xi Jinping emphasized: "Network security and informatization have a far-reaching impact on many areas of a country. We must recognize the situation and tasks we face, fully realize the importance and urgency of doing a good job, and plan, act and follow the trend." It can be seen that network security is an important issue related to national security and sovereignty, social stability, and the inheritance and development of national culture. Its importance is becoming more and more important as the pace of global informatization accelerates. "The door to the home is the door to the country", and security issues are urgent. From the perspective of network operation and management, they hope that the access, reading and writing of local network information will be protected and controlled, avoiding threats such as "traps", viruses, illegal access, denial of service, illegal occupation and illegal control of network resources, and stopping and defending against attacks by network hackers... Only by doing a good job in network security can we filter and block illegal, harmful or confidential information, avoid the leakage of confidential information, avoid harm to society, and cause huge losses to the country, and truly protect China's Internet security. For many years, apart from reading about network security in books and on the Internet, we want to learn more about network security, or listen to more cases and examples from network security, but we really don’t know what better way to get it? On October 9-10, 2014, our chance has come. GITC 2014 Global Internet Technology Conference Network Security Special: From device security, information security, software security, to explore the research fields of network security related technologies and theories involving confidentiality, integrity, availability, authenticity and controllability of network information. Listen closely to the voices of industry experts and learn more about network security. See you at GITC 2014 Global Internet Technology Conference on October 9-10. |
>>: GITC——Annual gathering of China's Internet technology elites
Eight years ago, the Yahoo team did a detailed st...
The “predecessors” of recommendation systems In 2...
Zhao Honglin - Introduction to the resources of t...
With the development of information technology, t...
Zhai Shanying's 8-episode video resource intr...
[[183466]] In addition to the measurement, layout...
Q: How to choose marketing promotion channels ? A...
Preface As of the end of March this year, accordi...
On January 21, today, according to the WeChat off...
This year, the iPhone 11 series triggered a rush ...
It is important to make users feel that the servi...
Since mid-July, many CPs and ASO ers have reporte...
The top-level structure of traffic logic ① Accura...
What is super marketing? [Super Marketing] is the...
Short videos have become an irreplaceable form of...