Question: Research on Computer Security Protection Technology Based on Information Liang Dong 1 , Xiangli Peng 1 , * , Yan Zhuang 1 , Zhaoyu Zhu
Research on Computer Security Protection Technology Based on Information
Liang Dong Xiangli Peng Yan Zhuang Zhaoyu Zhu Hao Xu Lei Zheng Hang Gao Yintie Zhang
State Grid Hubei Electric Power Information and Communication Company
Nanjing Data Foundation Technology Co Ltd
Information Systems Integration Branch, NARI Technology Co Ltd China
@qqcom
AbstractWith the rapid development of computer networking in all walks of life, network information security has attracted more and more attention from users. From the overall network information security to the security of a single computer and communication security has become a research focus. At present, the research on the computer's standalone information security has achieved initial results. It can be roughly divided into three key research areas: data integrity and security research, system integrity and credibility research, and service denial of service research. This paper proposes a design scheme of the computer's underlying input and output security subsystem based on the BIOS module. It uses information summary, identification and data encryption provided by cryptography to provide computer system integrity and legality detection, user identification and hard disk data and to protect and realize the security service to the standalone computer.
KeywordsInformation age, computer, network security, protection technology.
I.INTRODUCTION
The information age with computer networks as carriers has revolutionary significance in extending the tentacles of human economic life and sharing social and scientific information. Its unparalleled superiority in information storage, processing and transmission has laid the foundation for the rapid development and popularization of the network The foundation of the Internet, and the various side effects arising therefrom have gradually emerged, especially the various attacks and threats against the network itself such as computer viruses, hackers, etc., which seriously interfered with and disrupted the Internet information exchange architecture and even affected the state machine s Safe operation, so the issue of network security prevention is a focus that needs to be resolved urgently.
In the information age, computer network technology has made great progress, Computer network technology not only brings convenience to people's lifestyles, but also brings security risks to people's information. As we all know, the Internet has a strong vitality. Netizens communicate and communicate in a virtual space, to a certain extent, will promote the possibility of cybercrime. Network information security based on the era of big data is the focus of public concern. How to improve the security of computer network security technology has become an urgent social problem. Therefore, based on this social background, it has important theoretical and practical significance for the research of computer network security technology
IIINTRODUCTION TO RELATED TECHNOLOGIES
ARezone safety technology
Figure Rezone basic block diagram
Rezone security technology has introduced the ARM architecture specification since the ARMv version. Through the expansion of the processor, the entire ARM systemonchip is divided into two isolated execution regions: the safe world and the normal world. The two worlds have independent system resources, including registers, physical memory, and peripherals, as shown in Figure The security world is responsible for running a
IEEE rd International Conference on Information Systems and Computer Aided Education ICISCAE
$ IEEE Dalian, China
Authorized licensed use limited to: TEXAS A&M UNIVCOMMERCE. Downloaded on January at :: UTC from IEEE XploreS. e Rpetesmtribcetiro nsappl y
small number of sensitive security services, has a higher privilege level, and can access all resources of the normal world. The current security state of the CPU is identified by the NS bit of the security configuration register. This status bit is extended to other components through the system bus transmission to ensure that secure objects such as memory and peripherals cannot be accessed by nonsecure subjects such as CPU and DMA devices. new CPU execution modeMonitor modeas part of the safe world, responsible for switching between the two worlds. Rezone provides ways to enter Monitor mode: Software synchronization mode, that is normal world privilege mode calls the new processor smc instruction to enter Monitor mode; Asynchronous interrupt mode, that is by configuring an interrupt controller with Rezone support and related controls The register enables ARM's interrupt request and fast interrupt request to directly fall into Monitor mode for processing
B ARM architecture
ARM is currently the most commonly used processor architecture for mobile embedded devices and currently has
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
