Local area network information security

In a sense, it can be said that the life of a computer LAN lies in its confidentiality. However, some computer local area networks (LANs) have not been provided with effective security measures during the actual operation of the network, making it difficult for operators to process, store, and transmit confidential information within the organization on the Internet, resulting in the inability to fully utilize the role of the computer LAN.

Information confidentiality issues and measures

Computer information mainly refers to the programs and data stored on computers and their external devices. The so-called information leakage is the information that is deliberately or accidentally passed by someone else through reconnaissance, interception, stealing, analysis, and collection into computer LAN systems (especially Secret information and sensitive information, resulting in leaked events. At present, information leakage has become one of the major hidden dangers in computer LAN privacy issues.

Due to the accessibility of information, illegal terminal users can easily copy certain information on the computer's local area network to an external storage medium without leaving any traces, and then analyze and process it on other occasions. Although the value of such information in scattered forms may not be large, once the massive amount of related information in the network is brought together, its value is considerable, and the resulting losses are also very frightening. Although computer local area networks (LANs) can adopt a layered defense method to improve the security of the system, it is limited by the nature of computer local area network operating systems. It is always possible for external intruders who are familiar with network technology to break through the restrictions of these levels. This has brought great difficulties to confidentiality work.

Although the information of the computer LAN cannot be absolutely prevented, in combination with the current requirements for the development of the computer LAN privacy technology, we can improve the confidentiality measures of the computer LAN information in the following three aspects:

1. Make full use of the security measures provided by the network operating system. As one of the functions of the network operating system, network operating systems such as NetWare and Windows NT provide some degree of security measures such as network security, setting of directory and file access rights, and security of the file server. However, some end-users do not fully understand the confidentiality of computer LANs. Basically, they rarely use the security measures provided by network operating systems, leaving hidden risks for information leakage.

2. Strengthen the confidential protection of information. Since the network operating system does not have special security measures for the database. The data of the database is often stored on the hard disk of the computer in a readable form, so an additional method is needed to keep the database confidential. For example, with modern cryptographic techniques to encrypt data, important secret information is changed from plaintext to ciphertext, and so on.

3. Adopt firewall technology. It is true that the safest method of information security on computer LANs is not to connect to external networks. However, this is in no way contrary to the excellent situation of connecting to the wide area network (including the internet). Because the firewall is built on the barrier between the computer LAN and the external network, it can not only prevent external intruders from entering the computer LAN, but also allows internal users of the computer LAN to access the external network. Therefore, by using firewall technology, it can effectively prevent the computer LAN. Leakage caused by connecting with an external network.

Entity confidentiality issues and measures

The computer LAN entity refers to the computer and its external devices (including network components) involved in the process of information processing, processing, storage, transmission, collection, distribution, and utilization. The so-called physical leakage, in essence, through the computer and external devices to obtain information and cause leaks.

In the process of actual operation of a computer LAN, the entities that cause entities to leak are:

1. Electromagnetic wave leakage. Since computer equipment must radiate electromagnetic waves of different intensities during operation, it means that the monitor, network ports, transmission lines, etc. may all cause electromagnetic leakage during work without shielding or shielding. External intruders need only Instruments and equipment can receive this information within a certain range. If high-sensitivity instruments are used, the information currently being processed by the computer can be analyzed in a stable and clear manner.

2. Illegal connection to steal information. In a computer local area network, an end user can connect to other end users through internal communication lines and access data within the system. If the internal communication line of the computer local area network is not protected at all, there is a possibility that the information is illegally tapped to steal information, that is, an external intruder may connect an illegal terminal to an existing communication line or an end user, and the legal terminal When the user exits the operation, he/she accesses the computer LAN and intercepts relevant information in the network.

3. The remanent effect of the storage medium. Information in commonly used storage media (such as floppy disk, hard disk, etc.) often leaves traces of readable information after being erased, and most operating systems only delete the file name when deleting the file. It remains intact in the storage medium. Once these storage media are used by others, it will cause leaks.

For the confidential channels of the computer's local area network, corresponding security measures can be taken:

1. Prevent leakage of electromagnetic waves. Since the display is a weak link in computer security, and the display of stolen content is already a "mature" technology, in order to prevent leakage of electromagnetic waves, in addition to the use of low-emission displays, noise interference, electromagnetic wave shielding, etc. should be used. Measures to minimize electromagnetic wave leakage. For external devices such as network ports and transmission lines, physical shielding can be used to prevent leakage of electromagnetic waves.

2. Check the entity occasionally. In order to prevent external intruders from stealing information by becoming an end-user by illegally tapping the line, the communication lines, servers, and other external devices should be checked from time to time to ensure that the computer's local area network has not been illegally connected and illegal end users have been found.

3. Strengthen the management of storage media. In order to manage the storage medium efficiently, the storage medium should be stored and used in different categories, and the key storage medium should be protected against copying and information encryption, as well as the dedicated person destroying the discarded storage medium.

Baking And Decorating Tools

Pastry Tools,Baking Tools,Cake Decorating Tools,Cake Decorating Kit

Xiongyang Household Co., Ltd , https://www.yjkitchen-manage.com