计算机网络安全(国外英语资料)
计算机网络安全(国外英文资料)
First network security overview and environment configuration
1. narrow sense, that is to say, information security, is to introduce information security from the angle of natural science. In broad sense, information security involves many theories and application knowledge. Besides mathematics, communication, computer and other natural sciences, it involves law, psychology and other social sciences.
2 basic requirements for information security
Confidentiality, integrity, availability and non repudiation
3, the core idea of information security is the requirement for 4 aspects of the system or data: detect, detect, react and restore.
Using 4 initial letters to denote "PDRR", called "PDRR guarantee system".
4., from the hierarchical system, network security can be divided into 4 levels of security: physical security, logical security, operating system security and network security.
In October 5.1999, after the approval of the State Bureau of quality supervision, the computer security protection level was divided into 5 levels.
User protection level, system audit protection level, security mark protection level, structured protection level, access verification protection level
6. international evaluation standard for computer security level
C1, C2, B1, B2, B3, A
The D level is the lowest security level, and the operating systems at this level are DOS and Windows98.
There are several common operating systems at the C2 level: the UNIX system; the Novell 3.X or the higher version; the Windows NT, the Windows 2000 and the Windows2003 version.
The second chapter is the foundation of network security protocol
The 1.OSI model divides the processes required for communication sessions into 7 relatively independent layers.
The physical layer, data link layer, network layer and transport layer, session layer and presentation layer and application layer
The 2.TCP/IP protocol family consists of 4 functional layers: application layer, transport layer, network layer