Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Information Security Series (2)-- the basis of Information Security

2025-01-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

When we analyze a thing, we all hope to have a comprehensive understanding of things, rather than an one-sided view of the part; we all hope to fundamentally grasp the nature and laws of affairs, rather than just stay on the surface; we all hope to have some guidance in action, rather than stay in theory and concept. Here, the master borrows the easy-to-understand "5W analysis method" to discuss information security, hoping to explain information security comprehensively and essentially, as well as practical methods.

In this article, if we want to communicate and discuss, then we must speak the same language, and we must first make an agreement on the key words so as not to cause difficulties in understanding.

WHAT-what is information security?

Referring to the definition in the encyclopedia, `information refers to the objects transmitted and processed by audio, message and communication systems, and generally refers to all the contents spread by human society. Shannon, the founder of modern communications, pointed out that "information is something used to eliminate randomness." Maybe this explanation is abstract. IT information technology (Information Technology), information is the core. To understand information, you must first understand the data. The highest daytime temperature in Fuzhou today is 38 degrees, this is the data; in other words, Fuzhou is unbearably hot during the day, this is information; Huawei's high-end switch is 10 million yuan, this is data; Huawei high-end switch is very expensive, this is information. It can be seen that information and data are symbiotic, data reflect more objective and measurable indicators, and information applies more content that human beings can use for reference; data can extract and sum up information, and information must be supported and proved by data. In a word, the data is more objective and useful, while the information is more subjective, useful and useful to people. 'Today, Ali and Tencent have the personal data of hundreds of millions of users. Through big data's technical analysis, we can extract information about the behavior and consumption preferences of specific people, so as to carry out commercial development. It can be predicted that there will only be more and more transformation from data to information in the future, and the use of information in business will become more and more valuable.

WHY-Why is there a security problem?

From a sociological point of view, security means that there is no threat, no danger, harm, loss, and it is a positive thing relative to threat, harm and loss. Since information can be used by people, it is valuable and attractive. The current scene often happens: we are immersed in thinking about our work, and strange calls come across unexpectedly: "Hello, Big Brother, this is xxxx XX. Excuse me, do you plan to sell your house somewhere?" . The protagonist of this kind of call is often changed, such as a bank, an insurance company, an investigation agency, a conference agency, and so on. This is typical personal information is illegally leaked, illegal organizations or individuals to obtain information, use your personal information in the age, occupation, address, etc., to engage in some marketing activities, thus causing your unhappiness, disgust, and even feel a threat, these people know all the information, "God knows what they will do next." Man is a highly adaptable advanced creature. in the face of these calls and harassment, our nerves have become strong, our patience has also improved a lot, and these individuals or organizations have not found any further action for the time being. the two sides seem to have reached a balance. In spite of this, the threat of personal information is widespread, read a report, "credit card personal information, online transaction price of 50 cents a", underground transactions, clear real price, a cold sweat. Fortunately, the national legislature is aware of the problems in the protection of personal information and is working on the formulation of a personal information protection law. We know that in this era, each of us will encounter a variety of privacy threats, affecting personal life, property and even life safety. If you change the perspective to the organization, the organization also has all kinds of valuable information, and threats are everywhere, which will not be carried out here.

WHO-Security for who?

Back to the theme of information security, information security is the security of information. Apart from information security, we also have many other information security, such as traffic safety, fire safety, food safety, production safety and so on. Information security is an issue that people need to pay attention to from the information level, and we need to pay attention to the difference from other security. The essence of information security is information value and human security. we need to know the value of information, and then we know how to use it, how to prevent information from being improperly used, and then ensure information security.

The complete content of the article, welcome to visit the foundation of information security-- the second article

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report