Network security means that the hardware, software and data in the network system are protected from damage, change and disclosure due to accidental or malicious reasons, and the system operates continuously, reliably and normally without interruption of network services. Network security usually refers to the security of computer network. In fact, it can also refer to the security of computer communication network. Computer communication network is a system that interconnects several computers with independent functions through communication equipment and transmission media, and realizes information transmission and exchange between computers with the support of communication software. The factors affecting network security are as follows:

1. Network structure factors

There are three basic network topologies: star, bus and ring. Before a unit establishes its own intranet, each department may have built its own LAN, and the topology may be completely different. When building intranet, in order to realize the information communication between heterogeneous networks, it is often necessary to sacrifice the setting and implementation of some security mechanisms, so as to put forward higher requirements for network openness.

2. Network protocol factors

When building an intranet, users will inevitably protect the original network infrastructure in order to save money. In addition, in order to survive, network companies have higher and higher requirements for the compatibility of network protocols, so that the protocols of many manufacturers can be interconnected, compatible and communicate with each other. This not only brings benefits to users and manufacturers, but also brings security risks. For example, harmful programs transmitted under a protocol can quickly spread throughout the network.

3. Regional factors

Because the Intranet can be either LAN or WAN, the network often spans intercity and even international. The geographical location is complex, and the quality of communication lines is difficult to guarantee, which will not only cause damage and loss of information in the transmission process, but also create an opportunity for some “hackers”.

4. User factors

Enterprises build their own Intranet in order to speed up information exchange and better adapt to market demand. After the establishment, the range of users will be expanded from enterprise employees to customers and people who want to know about the enterprise. The increase of users also poses a threat to the security of the network, because there may be commercial spies or “hackers.”

5. Host factor

When establishing the intranet, the original local area networks and single computers are interconnected, and the types of hosts are increased, such as workstations, servers, and even small computers, large and medium-sized computers. Because the operating system they use is different from the network operating system, a vulnerability in an operating system may cause great hidden trouble to the whole network.

6. Unit safety policy

Practice has proved that 80% of the security problems are caused by the inside of the network. Therefore, the unit must attach great importance to the security of its own intranet and must formulate a set of rules and regulations for security management.

7. Personnel factors

Human factor is the weak link of security problem. We should carry out necessary safety education for users, select people with high professional ethics as network administrators, and formulate specific measures to improve safety awareness.

8. Other factors

Other factors such as natural disasters are also factors affecting network security.

With the rapid development of network security and information technology, it has been fully integrated into social production and life, and has profoundly changed the global economic pattern, interest pattern and security pattern“ The 14th five year plan and the long-term goal outline for 2035 emphasize strengthening network security protection and require “improving the ability of security protection and maintaining political security”. Under the new development situation, we should establish a correct concept of network security, adhere to overall development and security, constantly improve our ability to grasp the laws of the Internet, guide network public opinion, control information development and guarantee network security, resolutely maintain network ideological security and strive to improve our ability to maintain network security, Earnestly undertake the responsibilities and missions of network security defenders and network power builders.

Editor ajx

Leave a Reply

Your email address will not be published. Required fields are marked *