由于近期关注中国网络安全法,英文叫法为China Cyber Security Law, 但是印象中网络安全有Network Security, 哪么这两种有什么区别呢。

网上有很多种解释,总感觉不太准确,搜索了英文,感觉有些靠谱。

如果我们把公司的网络想像成一个城堡。

Network Security:

主要对应于内部使用网络,主要用于管理公司内的网络行为,监控公司内部的重要信息,员工的上网行为等等。

主要工作内容:

  1. 用户ID和密码--保证他们定期更换以及定时更新
  2. 防火墙-设置安全策略并监控流量
  3. internet访问-监控公司内员工访问网站
  4. 加密-加密重要员工的电脑以及公司重要文件,防止人为传播
  5. 备份-制定并遵循公司备份策略
  6. 扫描-定期扫描服务器弱点并监控客户端病毒
  7. 服务器连接监控-定期监控服务器日志以及不正常连接(个人增加)
  8. 网络安全培训-定期给员工做安全培训(个人增加)

Cyber Security:

主要是应对外部的威胁,network security 主要是应对内部网络安全,cyber security 主要是监控谁要翻越我们这座墙,或者在我们没有充分照顾到的地方打洞进来。这两项工作有重叠的地方,但是cyber security 更象是十字军东片保卫国王的骑士以及看管大门口外的野蛮人,同时他们也要兼顾这个城堡如何连接到外部的通道。

主要工作内容:

  1. 网络保护-监测并保护外部试图非法进入我们内部网络的不良分子
  2. 更新信息-跟踪黑客最新的攻击手段以及攻击方法
  3. 情报-识别外部攻击源并拒绝他们
  4. 应用程序-监控应用程序的指控并避免来自内部的意外违规

下面是源文章


Where Does Cyber Security Differ?

Cyber security is much more concerned with threats from outside the castle. Where network security is worried about what is going on within the castle walls, cyber security is watching who is trying to pass through the gate or breach the parapets. The two areas have a lot of overlap, but their areas of concern are quite different. The cyber security specialist is the crusading knight defending the kingdom. Cyber security focuses on the barbarians at the gate and how the castle connects to the world around it.

Network protection - detecting and protecting against outside attempts to get into the network

  • Up-to-date information - staying informed on how attackers and hackers are improving their efforts
  • Intelligence - identifying the sources of outside attacks and protecting against them
  • Applications - monitoring the use of applications to avoid unintended breaches from within

    What is Network Security?

    If the field of internet security is attractive to you, you need to know the important distinction between network security and cyber security. If you think of a company as castle fortified against outside threats, network security is concerned about maintaining peace and calm within the walls of the castle. It focuses on maintaining the fortifications, of course, but its primary purpose is to guard against problems from within. A person concerned with network security will be focusing on protecting a company's internal information by monitoring employee and network behavior in several ways. They are the shire reeve responsible for keeping peace in the land.

    IDs and passwords - making certain they are effective and updated frequently

  • Firewalls - keeping outside threats at bay
  • Internet access - monitoring the sites employees visit on the company's computers
  • Encryption - making certain that company information is useless to anyone outside the company
  • Backups - scheduling regular backups of company information in case of a hardware malfunction or successful outside threat
  • Scans - conducting regular virus and malware scans to detect any outside infection

Cyber security和Network security的区别相关推荐

  1. Cyber Security 和 Network Security

    网络范围区分: 1. Network Security: 主要对应于内部使用网络,主要用于管理公司内的网络行为,监控公司内部的重要信息,员工的上网行为等等. 2. Cyber Security: 主要 ...

  2. CLEARTEXT communication to xxx not permitted by network security policy

    2019独角兽企业重金招聘Python工程师标准>>> Android P http网络请求不通,报出异常:java.net.UnknownServiceException: CLE ...

  3. Azure PowerShell (13) 批量设置Azure ARM Network Security Group (NSG)

    <Windows Azure Platform 系列文章目录> 刚刚在帮助一个合作伙伴研究需求,他们的虚拟机全面的网络安全组(Network Security Group, NSG)会经常 ...

  4. 安卓9.0系统出现 CLEARTEXT communication to XX not permitted by network security policy

    1.原因:由于2018年发布的Android P限制了非加密的流量请求导致出现 not permitted by network security policy 2.解决方法: (1)把所有的http ...

  5. Android 9.0以上联网报错:CLEARTEXT communication to xxx.xxx.xxx.xx not permitted by network security policy

    Google为了保证用户数据和设备安全,针对Android 系统(Android P) 的应用程序,将要求默认使用加密连接.Android P 将禁止 App 使用所有未加密的连接,因此运行 Andr ...

  6. Software supply chain security | Network security

    本文授权自 MagicBoy Software supply chain security | Network security 1. 概念 2. 软件供应链阶段 3. 漏洞来源类型 4. 软件供应链 ...

  7. Penetration experience summary | Network security

    本文授权自 MagicBoy Penetration experience summary | Network security 1. 资产搜集 1.1. 利用FOFA,云悉等搜集web资产,并查看各 ...

  8. Network Security JumpStart

    版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版.作者信息和本声明.否则将追究法律责任. http://blog.csdn.net/topmvp - topmvp Build Y ...

  9. cocos creator 热更新报错 ERROR_DOWNLOAD_MANIFEST: not permitted by network security policy

    热更新报错信息:'Fail to download manifest file, hot update skipped.'  not permitted by network security pol ...

最新文章

  1. 数字图像处理——第七章 小波和多分辨处理
  2. MIT发布2018年全球10大突破性技术!
  3. js高级程序设计--AJAX JSON
  4. python手机自动化测试脚本语言_Python+Appium实现APP自动化测试
  5. 【习题 5-8 UVA - 230】Borrowers
  6. 数据竞赛入门-金融风控(贷款违约预测)二、EDA
  7. java线程属性_Java 并发 线程属性
  8. Android学习之多触点滑动
  9. 无法鼠标拖动选择_在 iPad 上用鼠标体验怎么样?我用这 12 款 App 试了一下
  10. oracle单行函数有哪些,oracle篇 之 单行函数
  11. jquery ui 发布jquery.ui-1.6rc4版本,漂亮多了
  12. 联想计计算机电源管理,联想电源管理软件energy manag
  13. rs485接口上下拉_RS485上拉下拉电阻计算详解
  14. npm安装报错: errno ETIMEDOUT network request toXXX failed, reason: connect ETIMEDOUT
  15. Markdown详细教程+技巧总结
  16. Android可上下左右滑动的列表
  17. GitHub上受欢迎的Android UI Library
  18. 蓝桥杯-填空题Ctrl+F
  19. MAVEN的安装与配置教程(超详细版)
  20. 【ML】线性回归 [单因子](LinearRegression)实践(基于sklearn)

热门文章

  1. 1162:字符串逆序
  2. 95% 的算法都是基于这 6 种算法思想,大厂Java面试必考点
  3. 关于工作方式的一些反思和总结
  4. Collect documents
  5. 什么是 MongoDB,为什么它是当今最受欢迎的数据库之一?
  6. halcon 区域分割 check_difference分割
  7. 英语自我介绍及问答整理
  8. 南京邮电大学网络攻防平台writeup————MISC
  9. 有向图强连通分量的Tarjan算法——转自BYVoid
  10. 记我的CTS框架研究(3)