In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
What this article shares with you is what the five basic attributes of network security are. Xiaobian thinks it is quite practical, so share it with everyone for reference. Let's follow Xiaobian and have a look.
The basic attributes of network security are: 1. confidentiality, information in the network is not obtained and used by unauthorized entities;2. integrity, ensuring that data and information are in a complete and undamaged state;3. availability, the ability to use information or resources expected;4. controllability, people have control over the dissemination and content of information;5. non-repudiation.
Network security has five basic attributes: confidentiality, integrity, availability, controllability and non-repudiation. These five attributes apply to a wide range of areas of national information infrastructure, such as education, entertainment, medical care, transportation, national security, power supply and communications.
confidentiality
The characteristic that information is not disclosed to, or made available to, unauthorized users, entities, or processes.
Confidentiality means that information in the network is not obtained and used by unauthorized entities (including users and processes). This information includes not only state secrets, but also business secrets and work secrets of enterprises and social organizations, as well as personal information. When people apply network, they naturally require network to provide privacy service, and the information to be protected includes both the information transmitted in network and the information stored in computer system. Just as telephone conversations can be tapped, so can network transmissions. The solution is to encrypt transmissions. The confidentiality of stored information is mainly achieved through access control, and different users have different permissions on different data.
integrity
The property of data that cannot be altered without authorization. That is, information is stored or transmitted without modification, destruction or loss. Data integrity is the assurance that data and information on a computer system are in an intact and undamaged state, that is, that data will not be altered or lost by intentional or unintentional events. In addition to the fact that the data itself cannot be destroyed, the integrity of the data also requires the correctness and credibility of the source of the data, that is to say, it is necessary to verify that the data is authentic and credible first, and then verify whether the data is destroyed. The main factors affecting data integrity are man-made deliberate destruction, including equipment failure and natural disasters.
availability
Availability refers to the expected ability to use information or resources, i.e., the characteristics that authorize entities or users to access and use information as required. Simply put, it is to ensure that information can be used by authorized persons when needed, and to prevent system denial of service caused by subjective and objective factors. For example, denial of service in a network environment, disruption of the network and related systems, etc. are all attacks on availability. Internet worm is to rely on a large number of replication and dissemination on the network, taking up a lot of CPU processing time, resulting in slower and slower systems, until the network crashes, users 'normal data requests can not be processed, this is a typical "denial of service" attack. Of course, data unavailability can also be caused by software bugs, such as Microsoft Windows always has bugs to be found.
controllability
Controllability refers to the ability of people to control the transmission path, scope and content of information, that is, not allowing bad content to be transmitted through public networks, so that information is effectively controlled by legitimate users.
non-repudiation
Non-repudiation is also called non-repudiation. In the process of information exchange, the true identity of the participants is assured, that is, all participants cannot deny and repudiate the operations and commitments that have been completed. Simply put, the sender cannot deny sending the information, and the receiver cannot deny receiving the information. Evidence of origin prevents the sender from denying that the message was sent, and evidence of receipt prevents the receiver from denying that the message was received. Data signature technology is one of the important means to solve the problem of non-repudiation.
Thank you for reading! About "what are the five basic attributes of network security" this article is shared here, I hope the above content can be of some help to everyone, so that everyone can learn more knowledge, if you think the article is good, you can share it to let more people see it!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.