What Is Network Security Analysis?

Network security refers to the protection of hardware, software, and data in network systems from accidental or malicious reasons, without being damaged, altered, or leaked. The system runs continuously and normally, and network services are not interrupted. [1]

Cyber security, usually referred to
along with
Network communication has the characteristics of joint operation throughout the entire network. As far as communication is concerned, it consists of five parts: transmission and exchange,
In the U.S
According to the International Cyber Security Research Report, the global
The network analysis system is a network management solution that allows network managers to take appropriate measures in various network security problems. It detects, analyzes, and diagnoses all data transmitted on the network, helping users to rule out network accidents and avoid security risks. Improve network performance and increase network availability value. [5]
There are different types of network security due to different environments and applications. There are the following: [5]
Natural disasters and accidents;
Network security issues are related to the in-depth development of future network applications. It involves security policies, mobile code, instruction protection, cryptography, operating systems, software engineering, and
Driven by the booming development of the network equipment and network application market, the network security market has ushered in a period of rapid development. On the one hand, with the expansion of the network, the network scale has expanded rapidly, and security issues have become increasingly complex. A trusted network is also a prerequisite for further development of network applications. On the other hand, as the services carried by the network become increasingly complex, ensuring application layer security is a new direction for the development of network security. [3]

Cyber security information security laws and regulations

In order to promote and standardize the management of informatization construction and protect the healthy and orderly development of informatization construction, the Chinese government has formulated a series of laws and regulations based on the actual situation of informatization construction. [7]
In March 1997, the Fifth Session of the Eighth National People's Congress of the People's Republic of China revised the Criminal Law of the People's Republic of China. The specific manifestations of the crime of illegally invading the computer information system and the crime of damaging the computer information system are clearly stipulated. [7]
In February 1994, the State Council issued the "People's Republic of China Computer Information System Security Protection Regulations", which mainly includes the concept of computer information systems, the content of security protection, the competent department of information system security, and the security protection system. [7]
In February 1996, the State Council promulgated the "Interim Provisions on the Management of Computer Information Networks of the People's Republic of China", which embodies the principles of the State's overall planning, unified standards, hierarchical management, and promotion of development of international networking. [7]
In December 1997, the State Council promulgated the "Administrative Measures for the Security Protection of International Networking of Computer Information Networks of the People's Republic of China", which strengthened the security protection of international networking. [7]
In June 1991, the State Council promulgated the Regulations of the People's Republic of China on the Protection of Computer Software, which strengthened the protection of software copyright. [7]
In June 2017, the State Council promulgated the "Cyber Security Law of the People's Republic of China", which is China's first basic law that comprehensively regulates issues related to cyberspace security management. [7]
On November 20, 2019, the National Internet Information Office publicly sought public opinions on the Administrative Measures for the Release of Cyber Security Threat Information (Draft for Comment) to regulate the behavior of publishing cyber security threat information. [8]

Cyber Security Cyber Ethics

Computer network is a "double-edged sword". It brings great convenience to our work, study and life. People can get a lot of knowledge and wealth from it. But if it is not used correctly, it will also bring harm to young people, mainly reflected in online rumors, online fraud, online crime, etc. So, what exactly should be done when surfing the Internet? What should not be done? See the following examples: [7]
Case 1: A netizen in Shanxi spread rumors of an earthquake and spread it on social media. He was detained for 5 days. [7]
Case 2: Wuhan Li wrote a "Panda Burning Incense" virus and spread it online, obtaining huge funds. Li committed a crime of "damaging computer information systems" and was sentenced to 4 years in prison. According to the "National Convention on the Internet Civilization of Young People" and the "Network Security Law", specific online behaviors and network ethics are clearly specified. [7]
(1) These can do
Report any behavior that endangers network security to the network information, telecommunications, public security and other departments. [7]
If it is found that a network operator has collected or used its personal information in violation of laws, administrative regulations or the agreement of both parties, it has the right to request the network operator to delete its personal information; if it finds that its personal information collected and stored is wrong, The right to ask the network operator to make corrections. [7]
(2) These cannot be done
Do not endanger network security, use the Internet to engage in endangering national security, honor and interests, instigate subversion of state power, overthrow the socialist system, instigate the split of the country, undermine the unity of the country, promote terrorism, extremism, promote national hatred, and national discrimination, Disseminate violent, obscene and pornographic information, fabricate and disseminate false information, disrupt economic and social order, and infringe others' reputation, privacy, intellectual property rights and other legitimate rights and other activities. [7]
Do not steal or obtain personal information in other illegal ways, and do not illegally sell or provide personal information to others. [7]
Do not establish websites or communication groups used to implement fraud, teach criminal methods, produce or sell illegal and criminal activities such as prohibited items, controlled items, and do not use the Internet to publish fraud related to the implementation of fraud, produce or sell prohibited items, controlled items, and other illegal activities Information on criminal activities. [7]
Do not engage in activities that endanger network security, such as illegally invading others networks, interfering with the normal functions of others networks, stealing network data, etc .; do not provide specifically designed to engage in intrusive networks, interfere with normal functions and protection measures of the network, steal network data, etc., and endanger network security Procedures and tools for activities; those who knowingly engage in activities that endanger network security shall not be provided with technical support, advertising promotion, payment settlement and other assistance. [7]
The electronic information and application software provided shall not be set up with malicious programs, and shall not contain information prohibited by law or administrative regulations from being published or transmitted. We should strengthen network ethics and literacy, consciously abide by network ethics, and do our part to create a healthy and orderly online public space. [7]

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?