Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What are the basic attributes of information security?

2025-01-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/02 Report--

This article mainly explains "what are the basic attributes of information security". The content of the explanation in the article is simple and clear, and it is easy to learn and understand. Please follow the editor's train of thought. Let's study and learn what are the basic attributes of information security.

The three basic attributes of information security: 1, confidentiality, refers to the characteristics that information is not leaked to unauthorized individuals and entities, or for their use; 2, integrity, refers to the characteristics that the information is not modified delayed, not out of order and not lost in the process of storage, transmission and extraction; 3, availability refers to the characteristics that the information can be accessed by legitimate users and can be used in the required order.

The operating environment of this tutorial: windows7 system, Dell G3 computer.

Information security (information security) involves the knowledge of information theory, computer science and cryptography. It studies the protection methods of information in computer systems and communication networks. It refers to the security protection of information carriers (processing carriers, storage carriers, transmission carriers) and the processing, transmission, storage and access of information during the generation, transmission, use and storage of information. To prevent the contents or capabilities of data information from being illegally used or tampered with.

The main information security threats include passive attacks, active attacks, insider attacks and distribution attacks. The main information security technologies include password technology, identity management technology, rights management technology, local computing environment security technology, firewall technology and so on. The development of information security has gone through the stages of communication security, computer security, information security and information guarantee.

Three basic attributes of Information Security

1. Confidentiality

Information confidentiality, also known as information confidentiality, refers to the characteristics that information is not leaked to or for use by unauthorized individuals and entities. Information confidentiality varies depending on how many objects the information is allowed to access.

The information that all personnel can access is public information, and the information that needs to restrict access is generally sensitive information or secret. secrets can be divided into different levels of secrecy according to the importance of information or the requirements of secrecy. for example, according to the impact of secret disclosure on national economic and security interests (consequences), state secrets are divided into three levels: a (secret level), B (secret level) and C (top secret level).

Secrets cannot be disclosed to unauthorized users or illegally exploited, and unauthorized users cannot know the content of the information even if they get the information. Confidentiality usually prevents unauthorized users from obtaining confidential information through access control and unauthorized users from knowing the content of information through encryption technology.

2. Integrity

Integrity refers to the characteristics that information is kept without modification delay, disorder and loss in the process of storage, transmission and extraction. Generally, tampering is prevented by access control, and information summarization algorithm is used to verify whether the information has been tampered with. Integrity is the characteristic that data can not be changed without authorization, and its purpose is to ensure that the data on the information system is in a complete and undamaged state.

3. Availability

Information availability refers to the characteristics that the information can be accessed by legitimate users and can be used in the required order, that is, the information can be accessed when needed. Availability is the measure of the service function and performance reliability of information resources, and it is the requirement of the overall reliability of the information system. At present, there is no particularly effective way to ensure that the system and network can provide normal services, except for backup and redundant configuration.

Thank you for your reading. the above is the content of "what are the basic attributes of information security". After the study of this article, I believe you have a deeper understanding of the basic attributes of information security. the specific use of the situation also needs to be verified by practice. Here is, the editor will push for you more related knowledge points of the article, welcome to follow!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report