WHCSRL 技术网

网络安全经典总结

  1. In the TCP/IP architecture, the ARP protocol is located at the link layer, and its role is to resolve the ip address to MAC address. ARP spoofing is a security risk at the link layer.
  2. RSA is not a symmetric cryptographic algorithm.
  3. The discretionary access model (DAC) usually uses the Access Control Capability Table to implement access control functions.
  4. The main theoretical basis of PKI is the public key cryptographic algorithm.
  5. The work of a certificate authority (CA): As a PKI management entity and service provider, it manages the generation, issuance, renewal and revocation of user digital certificates.
  6. SSL protocol is a security protocol attached to the transport layer.
  7. Private address is a reserved IP address. It is only used in the local area network and cannot be used on the Internet. Private addresses can be set up in Class A, Class B, and Class C addresses.
  8. Link layer is also called network interface layer or data link layer, is the bottom layer of TCP/IP, it is responsible< /strong>Receive the IP data from the network layer, and send the data to the designated network, or receive the physical frame from the network, extract the network layer datagram, and deliver it to the network layer.
  9. Usually use RC4 algorithm to encrypt documents.
  10. The life cycle of big data includes data collection, data storage, data processing, data distribution, and data deletion.
  11. The certificate user is not part of the PKI.
  12. In the TCP/IP protocol, the order of data encapsulation is: transport layer, internet network layer, network interface layer
  13. common access control Models include: discretionary access control, mandatory access control, and role-based access control models.
  14. Random process name is one of the technical means for malicious code to confuse administrators and system security inspectors. The random process name technology generates the malicious code process name randomly every time it is started, and makes itself not easy to find the real malicious code program name through the unfixed process name.
  15. Fuzzing test process: In-depth analysis of the causes of crashes or exceptions during website testing, and if necessary, testers need to reproduce and analyze them manually.
  16. A typical Internet of Things architecture usually includes: perception layer, transmission layer, support layer and application layer.
  17. Basic characteristics of digital signature: unforgeability, non-repudiation, message integrity.
  18. The access control model has three characteristics: accurate and unambiguous; simple, abstract, and easy to understand; it only involves security properties, but does not involve system functions or Its implementation details.
  19. In the OSI seven-layer model, the role of the transport layer is to provide end-to-end data transmission services and resume logical connections.
  20. PKI digital certificate: terminal entity<——>RA<——>Certification Authority (CA)
  21. Hash functionhas a single Directionality, the hash value of the message is calculated through the hash function, but the original content of the message cannot be calculated backward from the hash value. So the hash function is not bidirectional.
  22. In the Windows file system, FAT16 supports file encryption.
  23. Data acquisition and monitoring system (SCADA), distributed control system, and editable logic controller all belong to industrial control system.
  24. In the Kerch assumption of cryptography, the security of the cryptographic system depends only on the key.
  25. SFTP protocol refers to the SSH file transfer protocol, the port is 22.
  26. UDP transmission protocol is suitable for application environments that only transmit a small amount of data at a time and do not require high reliability.
  27. TCP/IP protocol is the most basic protocol currently used by the Internet, and it is also the basic protocol formed by the Internet. The TCP/IP architecture includes: link layer, network layer, transport layer, and application layer.
  28. HTTPS protocol is composed of HTTP protocol and SSL protocol.
  29. Public key encryption algorithm uses different keys for encryption and decryption.
  30. The main function of the Intrusion Detection System is to discover and report unauthorized or violations of security policies in the system.
  31. In the TCP/IP protocol, the IGMP protocol refers to the Internet Group Management Protocol, located at the network layer of the TCP/IP protocol< /strong>.
  32. Cryptography does not include communication protocol.
  33. From low to high, the OSI seven-layer model is the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer.
  34. IP is a protocol at the network layer, and IP address spoofing attacks are a security risk at the network layer.
  35. Cloud computing mainly has the following characteristics: on-demand self-service, ubiquitous access, resource pooling, rapid scalability, and measurable services.
  36. The advantages of symmetric encryption algorithm are simple algorithm, small calculation, fast encryption speed, high encryption efficiency, suitable for encrypting large blocks of data, and the length of the plaintext is equal to the length of the ciphertext.
  37. Software defect density value: https://blog.csdn.net/tozheng/article/ details/41076853
  38. An effective way to solve ARP spoofing is to use a "static" ARP cache. If the hardware address changes, you need to manually update the cache .

2021/10/11 Net Security Classic semi-final summary

推荐阅读