Home Common Problem Reasons for the asymmetry between network attack and defense

Reasons for the asymmetry between network attack and defense

Oct 24, 2019 am 10:23 AM
Network attacks

Reasons for the asymmetry between network attack and defense

# Network software generally refers to the system’s network operating system, network communication protocols and application-level special software that provides network service functions.

In a computer network environment, software used to support data communications and various network activities. Systems connected to computer networks usually configure different network application systems based on the characteristics, capabilities and service objects of the system itself. (Recommended learning: web front-end video tutorial)

The purpose is for local users to share the resources of other systems in the network, or to provide the functions and resources of the local system to the network used by other users. To this end, each computer network develops a set of network protocols that the entire network abides by, and requires each host system in the network to configure corresponding protocol software to ensure that different systems in the network can communicate and cooperate with each other reliably and effectively. .

Network hardware generally refers to extreme computer equipment, transmission media, and network connection equipment. As of 2011, there are many network-connected devices with varying functions and complexity.

Computers in the network can be divided into servers and workstations according to their different functions. The main function of the server is to control and coordinate the operation of each workstation on the network through the network operating system, process and respond to various network operation requirements sent by each workstation at the same time, and provide network services.

The workstation is the workplace of each network user, usually a computer or terminal. The workstation is connected to the network server through the transmission medium through the network interface board (network card) inserted in it.

According to the application types provided, network servers can be divided into several categories: file servers, application servers, and communication servers. Usually a network has at least one file server, and the network operating system and its application programs and shared hardware resources are installed on the file server.

The file server only provides hard disk sharing, file sharing, printer sharing and other functions for the network. When the workstation needs to share data, it takes it from the file server. The file server is responsible for the management, reception and sending of shared information. It does nothing to help the workstation process the requested information.

With the emergence of distributed network operating systems and distributed database management systems, network servers are required to not only have file server functions, but also be able to handle tasks submitted by users.

Simply put, when a network workstation wants to operate on shared data, the specific control operation is not only the processor at work, but also the processor on the network server, that is, there are multiple processors on the network. A processor processes a transaction. A server that has the function of executing user applications is called an application server.

What people say is that workstations in general microcomputer LANs do not share the CPU resources of the network server. This can be achieved if there is an application server. If the application is a database management system, it is sometimes called a database server.

The above is the detailed content of Reasons for the asymmetry between network attack and defense. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Repo: How To Revive Teammates
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Repo: How To Revive Teammates
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Article Tags

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Japan's JAXA apologizes for leaking partner information due to cyber attack Japan's JAXA apologizes for leaking partner information due to cyber attack Jul 10, 2024 pm 02:57 PM

Japan's JAXA apologizes for leaking partner information due to cyber attack

Research on the psychology of network hacker attacks Research on the psychology of network hacker attacks Jun 11, 2023 am 08:13 AM

Research on the psychology of network hacker attacks

A powerful tool to defend against network attacks: the use of Linux commands A powerful tool to defend against network attacks: the use of Linux commands Sep 08, 2023 pm 02:48 PM

A powerful tool to defend against network attacks: the use of Linux commands

What are the types of cyber attacks? What are the types of cyber attacks? Jan 04, 2021 pm 03:03 PM

What are the types of cyber attacks?

What are the 4 main types of cyber attacks? What are the 4 main types of cyber attacks? Oct 25, 2019 pm 05:55 PM

What are the 4 main types of cyber attacks?

Comprehensive analysis of network attack methods Comprehensive analysis of network attack methods Jun 11, 2023 pm 05:51 PM

Comprehensive analysis of network attack methods

Nine ways to use machine learning to launch attacks Nine ways to use machine learning to launch attacks Apr 09, 2023 pm 12:21 PM

Nine ways to use machine learning to launch attacks

How to protect CentOS servers from cyberattacks How to protect CentOS servers from cyberattacks Jul 08, 2023 pm 08:22 PM

How to protect CentOS servers from cyberattacks