In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-17 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
This article mainly explains "what are the attributes of computer security". The explanation in this article is simple and clear, easy to learn and understand. Please follow the ideas of Xiaobian and go deep into it slowly to study and learn "what are the attributes of computer security" together.
Computer security usually includes the following attributes: availability, reliability, integrity, confidentiality, non-repudiation, controllability, auditability and other attributes. Computer security is to protect computer hardware, software, data from accidental or malicious reasons and damage, change, disclosure.
Operating environment: Windows 7, Dell G3 PC.
Computer security generally includes the following attributes:
Availability, reliability, integrity, confidentiality, non-repudiation, controllability and inspectability.
Availability: The ability of authorized entities to access resources and services when needed.
Reliability: It means that the system completes the specified function under specified conditions and within specified time.
Integrity: information is not accidentally or deliberately deleted, modified, forged, out of order, replayed, inserted and other damage.
Confidentiality: ensuring that information is not exposed to unauthorized entities.
Non-repudiation: refers to the communication of both parties to its received and sent information are non-repudiation, also known as non-repudiation.
Controllability: The ability to control the dissemination and content of information.
Audibility: refers to the system occurred in the safety-related operations have explanatory records can be checked.
The above attributes are also attributes that information security should have.
extended information
For computer security, the international standardization committee gives the explanation is: for the data processing system established and adopted technology and management of security protection, protect computer hardware, software, data from accidental or malicious reasons and damage, change, disclosure. the definition of the computer management and supervision department of the ministry of public security of our country is: computer security refers to the security of computer assets, that is, computer information system resources and information resources are not threatened and harmed by natural and artificial harmful factors.
Ways to improve computer security attributes:
(1) Computer management implements the principle of "who uses who is responsible." Take good care of the machine, understand and be familiar with the machine performance, timely check or clean the computer and related peripherals.
(2) Master general knowledge of work software, office software and network use.
(3) There is no special work requirement, all work must be carried out in the intranet, and the management and destruction of work content stored on the storage medium must meet the confidentiality requirements and strictly prevent leakage.
(4) Confidential information shall not be processed on the external network, Internet or intranet, and confidential information can only be operated on a separate computer.
(5) Computer user name, password, hardware encryption should be kept confidential, leakage is strictly prohibited, password setting should be reasonable.
(6) Computers with wireless interconnection function shall not be connected to intranet, and confidential documents and work secret documents shall not be operated or stored.
(7) Non-internal computers are not allowed to access the intranet.
Thank you for reading, the above is the content of "what are the attributes of computer security?" After studying this article, I believe that everyone has a deeper understanding of what the attributes of computer security contain. The specific use situation still needs to be verified by practice. Here is, Xiaobian will push more articles related to knowledge points for everyone, welcome to pay attention!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.