Cyber Security

by Cyber Security July. 26,2023
Cyber Security

Cyber Security means that the hardware, software and data in the network system are protected from damage, alteration, or leakage due to accidental or malicious reasons. The system operates continuously, reliably, and normally, and the network services are not Interrupt



Network security usually refers to the security of computer networks, but in fact it can also refer to the security of computer communication networks. Computer communication network is a system that interconnects several computers with independent functions through communication equipment and transmission media, and realizes the transmission and exchange of information between computers with the support of communication software. The computer network refers to a system that uses communication means to connect several independent computer systems, terminal equipment, and data equipment that are relatively scattered in the region for the purpose of sharing resources, and conduct data exchange under the control of the protocol. The fundamental purpose of computer network is to share resources. Communication network is the way to realize network resource sharing. Therefore, computer network is safe, and the corresponding computer communication network must be safe. It should be able to realize information exchange and resource sharing for network users. In the following, network security refers to both computer network security and computer communication network security.


The basic meaning of security: objectively there is no threat, and subjectively there is no fear. That is, the object does not worry about its normal state being affected. Network security can be defined as: a network system is free from any threats and infringements, and can normally realize the function of resource sharing. To enable the network to normally realize the resource sharing function, it is necessary to first ensure the normal operation of the network's hardware and software, and then to ensure the safety of data information exchange. As can be seen from the previous two sections, due to the abuse of resource sharing, network security problems are caused. Therefore, the technical approach to network security is to implement limited sharing.

Relative concept

From the perspective of users (individuals or enterprises), they hope:

(1) The personal information transmitted on the network (such as bank account numbers and Internet login passwords, etc.) is not discovered by others, which is the user's requirement for the confidentiality of the information transmitted on the network.

(2) The information transmitted on the network has not been tampered with by others, which is the user's requirement for the integrity of the information transmitted on the network.

(3) The source of the information sent on the network is real, not fake. This is the identity authentication requirement that the user puts on the parties in the communication.

(4) The sender of the information acknowledges the information sent or a certain operation completed, which is the undeniable request made by the user to the sender of the information.

From the perspective of network operations and administrators, it hopes that the local information network will operate normally, provide services normally, be free from off-network attacks, and be free from threats such as computer viruses, illegal access, denial of service, illegal occupation of network resources, and illegal control. . From the perspective of the security department, it hopes to filter and prevent information that is illegal, harmful, and related to national security or commercial secrets, to avoid leaking information about national security or commercial secrets through the network, and to avoid harm to society , Causing economic losses to the enterprise. From the perspective of social education and ideology, the spread of unhealthy content should be avoided, and a positive online culture should be correctly guided.