NGN Security Technology

Source: Internet
Author: User

With the rapid development of the information industry, information technology has gradually become an important factor in leading national economic and social development. All countries in the world are actively coping with the challenges and opportunities of informatization. Informatization, networking, and digitalization are forming a new technological, industrial, and social revolution around the world. To develop informatization, we must attach great importance to information security. IT is not only an IT industry issue, but also a social issue and a multi-disciplinary system security engineering issue, it is directly related to national security. Therefore, some people have called on China to pay attention to information security issues as much as they pay attention.

The rapid development of the Internet has promoted the process of society entering the information age and set off a network boom. As a result, people's lifestyles have changed. However, as the first generation of the Internet, the Internet did not fully consider the information security issue at the beginning of its design. As a result, the world has to "patch" to cope with the increasing security issues.

Internet viruses, pervasive spyware, tested Trojans, and rampant hacker attacks have become a serious problem for the first generation of Internet users. Due to the unreliable security issues, the development of e-commerce based on the first generation of Internet is also blocked.

Nowadays, due to the shortage of IP Address resources and information security issues, people have finally made up their minds to develop and promote the Next Generation Network (NGN) and use NGN as the main carrier for future information transmission. From the perspective of information security, NGN is both an opportunity and a challenge. We must treat information security as an organic whole rather than an accessory of NGN. Information security must be one of the most important topics in NGN research.

What is next-generation network?

Next Generation Network (NGN) evolved and integrated on the basis of today's telecom networks. The ideal NGN can achieve interconnection between various networks. Users can enjoy various services provided by the network at any time, anywhere, and in various ways. NGN is a network that integrates various multimedia functions such as data, voice, and video. Imagine that in the near future, users can "face-to-face" video chats with their friends on the phone; they can share nice music with friends from far away on their mobile phones; you can talk to friends and friends from other countries, but you only need a small amount of money. This is undoubtedly a fascinating way of life. However, transactions always have two sides. While NGN brings us convenience, it also brings us more severe security risks.

Where are the security risks of NGN?

A network is a complex system. network hardware development, protocol design, and network application software development are all complex projects. This will inevitably lead to poor design. People cannot consider all the situations in the design phase and create a perfect network. Hidden risks are inevitable, and NGN is no exception. Its main security risks are manifested in the following aspects.

1. potential risks of physical devices

Device fault

Equipment on the network is generally running continuously all the year round, and hardware faults are inevitable. These faults can cause data loss and communication interruption, thus causing damage to user services. If some core devices fail, the entire network may be paralyzed.

Electromagnetic radiation

Electronic devices have electromagnetic radiation. On the one hand, the leakage of electromagnetic radiation allows eavesdroppers to use advanced receiving devices within a certain distance to steal information and data being transmitted, this seriously threatens user privacy. On the other hand, electromagnetic radiation can damage the communication data of other devices.

Line eavesdropping

In wireless communication, signals are transmitted in the air and cannot be protected by physical means. This allows some attackers to use some devices to eavesdrop or even change communication data. In wired communication, attackers can even directly intercept related information through physical connection.

Fire, flood and theft

These problems are caused by human error or other reasons. Once they occur, they are generally devastating.

2. software system risks

If the physical device is the "physical" of the network, then the software system is the "soul" of the network ". However, software systems inevitably have many design defects, which are hard to be found in the design phase. Once attackers have mastered these defects, they can be used for illegal attacks.

Operating system risks

The operating system is the software foundation of network applications. It is the "Neural hub" of network equipment and is responsible for controlling the running of hardware and scheduling of application software. Its importance is self-evident. Currently, linux, Unix, Windows, and embedded Vxworks are widely used on the network. No operating system can claim that it is completely secure, just as the existence of a large number of security vulnerabilities in Windows has caused serious security forms on the Internet, the hidden risks of the operating system also pose great security risks to the network system.

There are roughly three reasons for the potential operating system risks, as described below:

The programmer's human factors, in the programming process, in order to achieve ulterior motives, keep the backdoor in the handler of the program code.

Limited by the abilities, experience, and security technology of programmers at the time, there will inevitably be deficiencies in the program, which affects the program efficiency and leads to a higher permission for unauthorized users.

Due to hardware, programmers cannot make up for hardware defects, so that hardware problems can be manifested through software.

Many attacks exploit operating system vulnerabilities. Currently, Windows OS is the most vulnerable, because it is the most commonly used operating system. The second is Linux, Solaris, OS/2, and other operating systems. The main attack methods of hackers are to use some existing hacking tools or compile some programs to launch attacks, such:

Password Attack

The reason is that the password is too simple or easy to crack. For example, FTP server password, database management password, and system Super User Password. Some smart software can be used to crack these passwords through simple guesses, thus making users lose security protection.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.