Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Which data is protected by information security?

2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/02 Report--

This article will explain in detail what data is protected by information security. The editor thinks it is very practical, so I share it for you as a reference. I hope you can get something after reading this article.

Information security is to protect the "availability", "confidentiality", "integrity", "controllability" and "reviewability" of data. The purpose of information security is to protect computer hardware, software and data from destruction, modification and disclosure due to accidental and malicious reasons.

Correlation

Information security is defined by ISO (International Organization for Standardization) as the technical and administrative security protection established and adopted for data processing systems in order to protect computer hardware, software and data from destruction, modification and disclosure due to accidental and malicious reasons.

There are five criteria for measuring the security of information:

(1) the integrity of the information, ensuring that the information is not exposed to unauthorized users or processes, that is, the original data of the information cannot be illegally obtained or modified, which is the basis for ensuring the reliability of the information.

(2) availability of information, authorized legitimate users or processes can access the corresponding authorization information data at any time as needed (even if there is an attacker, the attacker cannot occupy all the resources and hinder the work of the authorized person)

(3) the confidentiality of information, only those who are allowed can modify the data and refuse illegal access.

(4) the controllability of information, the flow direction and behavior of information within the scope of authorization can be controlled.

(5) the reviewability of information can provide the basis and means of investigation for the network security problems. These five metrics can only qualitatively measure the security of the network.

This is the end of the article on "which data is protected by information security". I hope the above content can be helpful to you, so that you can learn more knowledge. if you think the article is good, please share it for more people to see.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report