In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-25 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
This article will explain in detail what are the five main features of network information security. The editor thinks it is very practical, so I share it for you as a reference. I hope you can get something after reading this article.
The technical characteristics of network information security are as follows: 1. Integrity; it means that the information keeps the characteristics of non-modification, non-destruction and non-loss in the process of transmission, exchange, storage and processing. 2. Confidentiality; refers to the characteristics that information is not disclosed to or utilized by unauthorized individuals, entities, or processes according to given requirements. 3. Availability. 4. Non-repudiation. 5. Controllability.
Network information security is a comprehensive discipline involving computer science, network technology, communication technology, cryptographic technology, information security technology, applied mathematics, number theory, information theory and so on.
It mainly means that the hardware and software of the network system and the data in the system are protected from being destroyed, changed and leaked by accidental or malicious reasons, the system runs continuously and reliably, and the network service is uninterrupted.
Main features
1. Integrity
It means that the information keeps the characteristics of non-modification, non-destruction and non-loss in the process of transmission, exchange, storage and processing, that is, keeping the information as it is, so that the information can be generated, stored and transmitted correctly, which is the most basic security feature.
two。 Confidentiality
Refers to the characteristics that information is not leaked to unauthorized individuals, entities or processes according to given requirements, or provides its utilization, that is, to prevent useful information from being leaked to unauthorized individuals or entities, and to emphasize that useful information is only used by authorized objects.
3. Usability
It refers to the characteristics that the network information can be accessed correctly by authorized entities and can be used normally or restored under abnormal circumstances, that is, the required information can be accessed correctly when the system is running, and when the system is attacked or destroyed, can be quickly recovered and can be put into use. Usability is a measure of user-oriented security performance of network information systems.
4. Undeniability
It means that in the process of information exchange, both sides of the communication are convinced of the true identity of the participants themselves and the information provided by the participants, that is, it is impossible for all participants to deny or deny their true identities, as well as the intact and completed operations and commitments to provide information.
5. Controllability
It refers to the characteristic that the information dissemination and specific content circulating in the network system can be effectively controlled, that is, any information in the network system should be controllable in a certain transmission range and storage space. In addition to using the form of conventional transmission sites and content monitoring, the most typical, such as password hosting policy, when encryption algorithms are managed by a third party, they must be strictly controlled.
This is the end of the article on "what are the five main features of network information security". I hope the above content can be helpful to you, so that you can learn more knowledge. if you think the article is good, please share it for more people to see.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.