Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Related information security system

2025-04-02 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

When I want to start the job, work is the "system", but after working for so many years, I still feel that I still have a superficial understanding of the system. From RISC of CPU, Feng of computer. Neumann, the hierarchical model of the network, to a wide range of information systems, whether local or overall, has its own system. Looking at everything, the human body has its own physiological system, the house has its own building system, and the society also has its own operating system. The so-called system is the objective law of the internal composition, interrelation and operating mechanism of something. As defined by the DoDAF (Defense system Framework) of the United States, "systems are the interrelationships between the components of systems and the guidelines that govern their evolution." How difficult it is to establish a system. This DoDAF only establishes a set of standard methods for describing the information system architecture, which still needs to be understood by the designers themselves.

Later in the work came into contact with the so-called information security system, but also mostly just this description framework or method. The more famous ones include IATF (Information Assurance Technology Framework) of NSA in the United States, which divides the protection of information systems into protection of computing environment, protection of boundaries, protection of network infrastructure, supporting infrastructure and detection response infrastructure, which is still a very classical division method, and the shadow of IATF can still be seen in many information security solutions. Up to now, the defense in depth thought of IATF is still the basis for the superimposed use of various security mechanisms. Another famous architecture is ITU-T X.805mura, a system security system that provides end-to-end communication. It divides the telecommunications network into three layers: infrastructure layer, service layer and application layer, three planes of user, control and management plane, and security services of eight security dimensions such as access control, authentication and data confidentiality. IATF describes which security services need to be used at each level of each plane. To deal with *. There is also the famous PDR model and its variants, which describes the time-based concept of security. The so-called security means that the protection time is greater than the detection time + response time, in other words, security is timely detection and response.

Based on the above popular description framework of the information security system, the information security system is easier to understand, and it is more advantageous for manufacturers to promote their own security equipment, and it is helpful for project planners to better organize their own projects. However, it is difficult to sum up what the information security system itself is. Composition may be clear, but the relationship between components and operating mechanism, compared with the network, computers, software, it is difficult to understand. This is a field of all kinds of safety products, management measures and evaluation methods, which can hardly be said to have a system. This is also a world where loopholes are patched, poisonous are killed, and important data are encrypted. A variety of scattered engineering methods and technologies are full of them, and it is difficult to say that there is a consistent law of objective domination.

Therefore, there is no consistent and unified system for security. More often, the security system is just a classification method to cater to the needs of planning or decision makers and facilitate communication and understanding. With regard to the law of operation behind the security system, in addition to cryptography has a solid theoretical foundation, I think everyone may have their own point of view.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 268

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report