由于近期关注中国网络安全法,英文叫法为China Cyber Security Law, 但是印象中网络安全有Network Security, 哪么这两种有什么区别呢。
网上有很多种解释,总感觉不太准确,搜索了英文,感觉有些靠谱。
如果我们把公司的网络想像成一个城堡。
Network Security:
主要对应于内部使用网络,主要用于管理公司内的网络行为,监控公司内部的重要信息,员工的上网行为等等。
主要工作内容:
Cyber Security:
主要是应对外部的威胁,network security 主要是应对内部网络安全,cyber security 主要是监控谁要翻越我们这座墙,或者在我们没有充分照顾到的地方打洞进来。这两项工作有重叠的地方,但是cyber security 更象是十字军东片保卫国王的骑士以及看管大门口外的野蛮人,同时他们也要兼顾这个城堡如何连接到外部的通道。
主要工作内容:
下面是源文章
Cyber security is much more concerned with threats from outside the castle. Where network security is worried about what is going on within the castle walls, cyber security is watching who is trying to pass through the gate or breach the parapets. The two areas have a lot of overlap, but their areas of concern are quite different. The cyber security specialist is the crusading knight defending the kingdom. Cyber security focuses on the barbarians at the gate and how the castle connects to the world around it.
Network protection - detecting and protecting against outside attempts to get into the network
Up-to-date information - staying informed on how attackers and hackers are improving their efforts Intelligence - identifying the sources of outside attacks and protecting against them Applications - monitoring the use of applications to avoid unintended breaches from withinIf the field of internet security is attractive to you, you need to know the important distinction between network security and cyber security. If you think of a company as castle fortified against outside threats, network security is concerned about maintaining peace and calm within the walls of the castle. It focuses on maintaining the fortifications, of course, but its primary purpose is to guard against problems from within. A person concerned with network security will be focusing on protecting a company's internal information by monitoring employee and network behavior in several ways. They are the shire reeve responsible for keeping peace in the land.
IDs and passwords - making certain they are effective and updated frequently
Firewalls - keeping outside threats at bay Internet access - monitoring the sites employees visit on the company's computers Encryption - making certain that company information is useless to anyone outside the company Backups - scheduling regular backups of company information in case of a hardware malfunction or successful outside threat Scans - conducting regular virus and malware scans to detect any outside infection