MENU service case
 Website construction website design Beijing website construction high-end website production company Shangpin China
We create by embracing change
360 ° brand value__
simplified Chinese character
Simplified Chinese English

Shangpin China Joins Hands with Beisheng Internet to Create a New Chapter in Website Construction

Type: Shangpin Dynamic Learn more

Background and significance of Internet research

Source: Shangpin China | Type: website encyclopedia | Time: June 12, 2014
Research background
In the information age, people have website make Is becoming more and more dependent. The security of information systems, especially all kinds of software running in information systems, has also received more and more attention. The incompleteness of the security design itself may constitute new information security risks, so new risk points, new vulnerabilities and new attack techniques will appear at any time. Since the emergence of WAN, viruses, trojans, hackers and computer crimes have made people afraid of network security, which has seriously restricted the development of informatization, e-commerce and e-government. The ultimate purpose of virus and hacker attacks is to illegally enter the user's information system and tamper with or embezzle the data on the computer. Firewall and anti-virus software can only passively resist these attacks.

Since computers began to be popularized in the mass market in the mid-1990s, security problems have been puzzling manufacturers and users. In the early days of computer popularization, secret information was mainly protected by password, non-standard storage format and other methods. Its security principle was realized by the asymmetry of "key information" between the legitimate owner of the information and the external personnel of the system. With the rise of the network, the exchange of sensitive information between entities requires new technologies to further ensure security, so the ancient cryptography technology has been developed rapidly. It relies on the combination of cryptography and key to ensure the confidentiality and integrity of information, the uniqueness of entity identity, and the undeniability of operation and process. This stage is called the password protection technology stage. In the past, only government agencies, commercial banks, stock exchanges, large websites and some technology intensive enterprises would put forward requirements for information security, and individual consumers were still at the stage of "whether they can own a computer", so naturally they would not think about security issues proactively. At this stage, the only way to improve information security is to use special hardware equipment (firewall, etc.) for protection, and set up a special information department to manage and improve information security. The annual investment of each unit is quite amazing. With the popularization of network interconnection, especially the Internet, the standardization and construction of network equipment and protocols based on the premise of trust worldwide make information exchange extremely easy, and also make password protection become a technology that cannot be loaded or easily bypassed. After the popularization of computers, individual consumers also began to pay attention to the security of information, but hacker intrusion activities also became rampant. Although the damage at that time was limited to destroying and stealing users' data, with limited losses, users began to suffer from this problem. When e-commerce and online banking become increasingly popular, security issues are closely related to the interests of individual consumers. However, computer technology to prevent hacker intrusion has not improved substantially. Obviously, computers will become more and more important in future life. If security technology is not improved in time, it will lead to serious problems, and even restrict the expansion of computer function applications in turn.

In today's information technology environment, network threats include internal and external threats, threats brought by active and passive attacks. The characteristics of network threats, such as concealment, system, fuzzy boundary, abruptness and easy to be ignored, require us to attach great importance to them. At the same time, with the increase of human dependence on network office automation, dependence will inevitably lead to vulnerability (technological vulnerability, social vulnerability, human vulnerability). The incompleteness of the security design itself may constitute a new information security risk. Therefore, management security problems such as new risk points, new burrows, and new attack techniques will emerge at any time. Although the security threats from the network are increasing day by day, many threats are not in the form of network intrusion, but come from the misoperation or malicious operation of internal legitimate users. Therefore, security management requires to consider a series of issues such as security configuration, normal operation, security operation, emergency response and security audit of the network system.

If you want to build a truly secure and reliable computer, you must make up all the possible attack vulnerabilities mentioned above. The corresponding schemes are as follows: protect the data in memory to prevent unauthorized illegal snooping; Create a trusted input/output system to prevent sensitive password information from being acquired by intruders during keyboard input or screen output; Create closed program execution to ensure that program instructions can be executed in sequence without interference from other factors. Since the internal environment is impeccable, it is difficult for intruders to carry out normal vulnerability attacks, and the security of the system will also be upgraded to a new high level.

The traditional information security system, which is mainly composed of the old three types (firewall, intrusion monitoring and virus prevention), focuses on external prevention, which is inconsistent with the actual situation that the main threats to information security come from inside. From the three levels of servers, networks and terminals that make up the information system, the existing protection means are decreasing layer by layer. People often pay too much attention to the protection of servers and network devices, thus ignoring the protection of terminals. Malicious attack means are changeable, while the third one is blocking. For example, the network layer is fortified to block illegal users and unauthorized access on the periphery. This blocking method is to capture the characteristic information of hacker attacks and virus intrusions, but it is characterized by the lag information that has occurred and cannot scientifically predict future attacks and intrusions. Therefore, people closely combine the underlying computing technology with cryptographic technology, thus promoting the research of information security technology to enter the stage of trust computing technology.

research meaning
People are more and more dependent on computer systems, but computer hacker attacks such as viruses and trojans are emerging endlessly to endanger and threaten the information security of computer systems, so trusted computing of computer systems becomes more and more important. Trusted computing technology is one of the effective methods to remove the threat of computer networks and terminals. The traditional information security measures are nothing more than "plugging loopholes, building high walls and preventing external attacks", but the final result is that it is impossible to prevent. The main reason is not to control the source of unsafe problems, but to block them outside. Academician Shen Changxiang, an expert of the National Informatization Expert Advisory Committee, believes that in order to solve the structural insecurity of PC, trusted computing should be implemented worldwide.

Since Anderson first proposed the concept of trusted system in the early 1970s, the credibility of information systems has been widely concerned by academia and industry.

Trusted computing technology is a new research hotspot in the field of information security in recent years. Its research aims to effectively solve the insecurity of computer structure and fundamentally improve the security of the system. Trusted computing has changed people's traditional way of thinking about information security. It starts from the terminal to prevent attacks, and improves the security of the terminal system, so that every user in the information system has been authenticated and authorized, and its operation complies with the regulations, so that no offensive accidents will occur‘ The security problem of the entire information system can be solved by starting from the terminal. " Academician Shen Changyang proposed this idea as early as the early 1990s.

The essence of trusted computing technology is to require the transaction and computing equipment in the information system to be trusted, reliable, secure and protected. Trusted, running with a known scheme, and able to communicate with the scheme in advance; Reliable, always available for transactions and communications, and resistant to viruses and other intrusions; Safe, able to stop unnecessary interference or observation procedures; It is protected. In order to keep the computer confidential, it only shares information with necessary personnel within the setting range of common parameters.

As the core of trusted computing technology, trusted computing platform has become the basic and platform equipment of information system. The trusted source of the trusted computing platform comes from the Trusted Platform Module (TPM). The trusted platform module is a hardware device connected to the platform motherboard, which is used to verify identity and process variables used by computers or devices in a trusted computing environment. The TPM and the data stored in it are separate from all other components of the platform. The Trusted Platform Module (TPM) itself is a small control and management system, which serves as the source of information for the platform runtime. All security authentication and security calls of the system are completed through TPM, and a complete trust chain relationship of network application software operating system hardware user is established. Under the effect of trust transmission, the integrity check of the security mechanism is realized, thus ensuring the credibility of each link, and thus ensuring the credibility of the entire system.
 
The main function of trusted computing platform is to ensure the authenticity and legitimacy of user identity and authority; The integrity and availability of the workspace; Ensure confidentiality and integrity of storage, processing and transmission; Ensure the integrity of hardware environment configuration, operating system kernel, services and applications; Ensure the security of key operation and storage; Ensure that the system is immune to viruses and hackers. It plays a very important role in building the information security environment and ensuring the source security. The user authentication in the network environment can not only include the user's identity information, but also the hardware information of the PC, which can better ensure the security of network communication and identity authentication, and ultimately achieve the best combination of the most basic information security functions such as anti-virus and anti intrusion with the trusted computing platform.
 
As the product of the integration of computer technology and communication technology, the Internet has become the largest artificial information system after nearly 40 years of development. With the continuous emergence of new application modes such as e-commerce, e-government and cross domain resource sharing, people gradually realize that the credibility of software systems in the Internet environment has become a problem to be solved. The credibility of Internet software stems from the uncontrollability and uncertainty of resource behavior in the Internet environment, which is also related to the openness Dynamics is closely related to the growth, autonomy, diversity and other natural characteristics of resources. At the same time, due to the continuous expansion of application scale, the types and scope of resources involved, the improvement of application complexity and the innovation of computing mode, higher requirements have been put forward for the reliable assurance of software systems in the Internet environment.
    
For China's informatization construction, e-government, e-commerce system, enterprise informatization system, military secret, communication, battle command system, etc. all urgently need a secure and reliable computing platform to build a security guarantee system. First, in the construction of e-government system, identity authentication, authorization management and responsibility verification need to be based on a trusted computing platform. Secondly, relevant technical measures (such as security gateways, security gateways, security firewalls, etc.) used for security isolation of classified and non classified networks need to be based on trusted computing platforms. Finally, the informatization construction of military confidential information, communication and battle command system is an important part of national defense construction, and its information security is directly related to the life and death of the country. They also need to be based on a trusted computing platform.
 
Under the Internet environment, whether the computer system is trusted, including whether the hardware, network, operating system, middleware, application software, information system users, and the complex systems that interact with them are trusted. Problems in any link of this chain will lead to the untrusted computer system.
Source Statement: This article is original or edited by Shangpin China's editors. If it needs to be reproduced, please indicate that it is from Shangpin China. The above contents (including pictures and words) are from the Internet. If there is any infringement, please contact us in time (010-60259772).
TAG label:

What if your website can increase the number of conversions and improve customer satisfaction?

Make an appointment with a professional consultant to communicate!

* Shangpin professional consultant will contact you as soon as possible

Disclaimer

Thank you very much for visiting our website. Please read all the terms of this statement carefully before you use this website.

1. Part of the content of this site comes from the network, and the copyright of some articles and pictures involved belongs to the original author. The reprint of this site is for everyone to learn and exchange, and should not be used for any commercial activities.

2. This website does not assume any form of loss or injury caused by users to themselves and others due to the use of these resources.

3. For issues not covered in this statement, please refer to relevant national laws and regulations. In case of conflict between this statement and national laws and regulations, the national laws and regulations shall prevail.

4. If it infringes your legitimate rights and interests, please contact us in time, and we will delete the relevant content at the first time!

Contact: 010-60259772
E-mail: [email protected]

Communicate with professional consultants now!

  • National Service Hotline

    400-700-4979

  • Beijing Service Hotline

    010-60259772

Please be assured to fill in the information protection
Online consultation

Disclaimer

Thank you very much for visiting our website. Please read all the terms of this statement carefully before you use this website.

1. Part of the content of this site comes from the network, and the copyright of some articles and pictures involved belongs to the original author. The reprint of this site is for everyone to learn and exchange, and should not be used for any commercial activities.

2. This website does not assume any form of loss or injury caused by users to themselves and others due to the use of these resources.

3. For issues not covered in this statement, please refer to relevant national laws and regulations. In case of conflict between this statement and national laws and regulations, the national laws and regulations shall prevail.

4. If it infringes your legitimate rights and interests, please contact us in time, and we will delete the relevant content at the first time!

Contact: 010-60259772
E-mail: [email protected]