Information security and firewall technology of TCP/IP network

Source: Internet
Author: User
Tags firewall

Since the Internet has entered our life, so far, its impact has almost reached every corner of the world, truly from the information sense of the formation of a global village. Over the past decade, the number of Internet users and bandwidth has grown at an alarming rate, according to the latest statistics of CNNIC in July 2000, the number of Chinese netizens has reached 16.9 million, compared with the 8.9 million in January of the same year, in a short period of six months, the number of netizens increased by one times; July 2000, Domestic registration of various types of domain names reached 99,734, compared to the same year in January, 48,695 also increased by one times. January 2000 statistics show that the total bandwidth of China's international lines reached 35lMbps, and July 2000, this number has reached 1234Mbps, is expected to reach 3.3Gbps 2001. But then comes the many factors that are associated with it, such as the shortage of IP address, the proliferation of spam Information, the impact on traditional ethical concepts, especially the security problems caused by the defects inherent in the current network protocol TCP/IP.

The information security on the network can be divided into three parts: System Information Security, communication information security and information content security. The security of System information on network includes user password authentication, user access rights control, data access permission, mode control, security audit, security problem tracking, computer virus control, data encryption and so on. The dissemination of information on the network security focuses on the prevention and control of the consequences of the dissemination of illegal and harmful information, To avoid the uncontrolled transmission of information on public networks; the security of information content on the network focuses on protecting the confidentiality, authenticity and integrity of the information, avoiding the attacker exploiting the system's security vulnerabilities for eavesdropping, posing, swindling and so on, which is essentially protecting the interests and privacy of the users.

Because the TCP/IP protocol itself in the security of vulnerability, in fact, the current Internet information, regardless of system information, or content information, have unsafe factors, such as a large number of Web sites are hacked, user personal accounts, bank accounts stolen, defense confidential files stolen, etc. Explain the insecurity of the network it has seriously affected its own development. Last year was the media to fry the electronic commerce finally was neglected one of the important reasons is: how to ensure the security of online transaction information?



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.