Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What are the characteristics of server information security

2025-01-17 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/01 Report--

This article mainly explains "what are the characteristics of server information security". Interested friends may wish to take a look. The method introduced in this paper is simple, fast and practical. Next let the editor to take you to learn "what are the characteristics of server information security"?

The characteristics of information security are: 1, integrity, that is, keeping the information as it is, so that it can be generated, stored and transmitted correctly; 2) confidentiality, that is, to prevent useful information from leaking to unauthorized individuals or entities; 3, availability; 4, non-repudiation; 5, controllability, that is, any information in the network system should be controllable within a certain transmission range and storage space.

The operating environment of this tutorial: windows7 system, Dell G3 computer.

Information security is defined by ISO (International Organization for Standardization) as the technical and administrative security protection established and adopted for data processing systems in order to protect computer hardware, software and data from destruction, modification and disclosure due to accidental and malicious reasons.

So what are the characteristics of information security?

The five characteristics of network information security: ① integrity, ② confidentiality, ③ availability, ④ non-repudiation, ⑤ controllability, are to ensure the effectiveness of electronic information.

1. Integrity

It means that the information keeps the characteristics of non-modification, non-destruction and non-loss in the process of transmission, exchange, storage and processing, that is, keeping the information as it is, so that the information can be generated, stored and transmitted correctly, which is the most basic security feature.

Integrity implementation:

There are two basic methods for data integrity protection: one is access control method, which restricts unauthorized entities from modifying protected data; the other is damage-detection method, which can not avoid data corruption, but ensures that these damages can be detected and corrected or alerted. Generally, integrity protection is realized by message authentication code (MAC) or digital signature mechanism. When it is confirmed that the hash value cannot be modified, a simple hash algorithm can also be used to protect the integrity of the data. For example, hash values for system image integrity protection are often stored in trusted computing modules or one-time programming ROM.

2. Confidentiality

It refers to the feature that information is not leaked to unauthorized individuals or entities according to given requirements, that is, useful information is prevented from leaking to unauthorized individuals or entities, and it is emphasized that useful information is only used by authorized objects.

Confidentiality implementation:

There are three basic methods to realize confidentiality protection: the first is access control to prevent the enemy from accessing sensitive information; the second is the method of information hiding to prevent the enemy from discovering the existence of sensitive information; and the third is the method of information encryption. allows the enemy to observe the representation of the information, but it is impossible to get the original information content or extract useful information from the representation.

3. Availability

It refers to the characteristics that the network information can be accessed correctly by authorized entities and can be used normally or restored under abnormal circumstances, that is, the required information can be accessed correctly when the system is running, and when the system is attacked or destroyed, can be quickly recovered and can be put into use. Usability is a measure of the user-oriented security performance of the network information system (so that the information can be used normally according to the requirements of the user).

Availability implementation:

The basic method to realize availability protection is redundancy and backup.

4. Non-repudiation

It means that in the process of information exchange, both sides of the communication are convinced of the true identity of the participants themselves and the information provided by the participants, that is, it is impossible for all participants to deny or deny their true identities, as well as the intact and completed operations and commitments to provide information.

Non-repudiation implementation:

Although the use of undeniable function can not prevent communication participants from denying the occurrence of communication exchange, it can provide credible evidence when disputes arise, which is conducive to dispute resolution. Non-repudiation in the network environment can be divided into origin undeniable and transmission undeniable, mainly through digital signature technology.

5. Controllability

It refers to the characteristic that the information dissemination and specific content circulating in the network system can be effectively controlled, that is, any information in the network system should be controllable in a certain transmission range and storage space.

Controllability implementation:

In addition to using the form of conventional transmission sites and content monitoring, the most typical, such as password hosting policy, when encryption algorithms are managed by a third party, they must be strictly controlled.

At this point, I believe that everyone on the "server information security features" have a deeper understanding, might as well to the actual operation of it! Here is the website, more related content can enter the relevant channels to inquire, follow us, continue to learn!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report