What are the three major types of information security? What are the five characteristics of informa

Updated on technology 2024-02-16
7 answers
  1. Anonymous users2024-02-06

    Information security itself includes a wide range of confidential security, such as national military and political security, and a small scope, of course, including preventing the leakage of commercial enterprise secrets, preventing young people from browsing bad information, and leaking personal information. The information security system in the network environment is the key to ensure information security, including computer security operating system, various security protocols, security mechanisms (digital signature, information authentication, data encryption, etc.), and even the security system, any one of which can threaten the global security. Information security services should at least include the basic theories that support information network security services, as well as the network security service architecture based on the new generation of information network architecture.

    Information security means that the hardware, software and data in the information network and its system are protected from accidental or malicious reasons that are destroyed, changed or leaked, the system runs continuously, reliably and normally, and the information service is not interrupted.

    Information security is a comprehensive discipline involving computer science, network technology, communication technology, cryptography technology, information security technology, applied mathematics, number theory, information theory and other disciplines.

    Broadly speaking, all related technologies and theories related to the confidentiality, integrity, availability, authenticity and controllability of information on the network are the research fields of network security.

  2. Anonymous users2024-02-05

    Information security mainly includes the following five aspects, that is, to ensure the confidentiality, authenticity, integrity, unauthorized copying of information and the security of the parasitic system. Information security itself includes a wide range of information, including how to prevent the leakage of business enterprise secrets, prevent teenagers from browsing bad information, and the leakage of personal information. The information security system in the network environment is the key to ensuring information security, including computer security operating systems, various security protocols, security mechanisms (digital signatures, message authentication, data encryption, etc.), and security systems, such as UNINAC and DLP, as long as there are security vulnerabilities that can threaten global security.

    Information security refers to the protection of information systems (including hardware, software, data, people, physical environment and their infrastructure) from accidental or malicious reasons to be destroyed, changed or leaked, the system continues to operate reliably and normally, information services are not interrupted, and business continuity is finally realized.

    The discipline of information security can be divided into two levels: narrow security and broad security, and the narrow sense of security is based on the field of computer security based on cryptography. Information security in a broad sense is a comprehensive discipline, from traditional computer security to information security, not only the name change is also an extension of the development of security, security is a simple technical problem, but the product of the combination of management, technology, law and other issues. This major cultivates senior professionals in information security who can be engaged in the fields of computer, communication, e-commerce, e-government, and e-finance.

  3. Anonymous users2024-02-04

    I didn't understand what you mean, only heard about the mobile phone virus.

  4. Anonymous users2024-02-03

    The five characteristics of information security are:

    1. Integrity

    It refers to the characteristics of non-modification, non-destruction and non-loss of information in the process of transmission, exchange, storage and processing, that is, to maintain the original nature of the information, so that the information can be correctly generated, stored and transmitted, which is the most basic security feature.

    2. Confidentiality

    It refers to the characteristic that the information is not disclosed to unauthorized persons, entities or processes according to the given requirements, or provides its use, that is, it prevents the leakage of useful information to unauthorized individuals or entities, and emphasizes the characteristics that useful information is only used by authorized objects.

    3. Availability

    It refers to the characteristics that network information can be correctly accessed by authorized entities and can be used normally or resumed under abnormal circumstances as required, that is, the required information can be correctly accessed when the system is running, and can be quickly recovered and put into use when the system is attacked or damaged. Usability is a measure of the user-facing security performance of a network information system.

    4. Non-repudiation

    It means that in the process of information exchange, the two parties are convinced that the participants themselves and the true identity of the information provided by the participants are the same, that is, it is impossible for all participants to deny or deny their true identity, as well as the originality of the information provided and the completed operations and commitments.

    5. Controllability

    It refers to the characteristics that can effectively control the information transmission and specific content circulating in the network system, that is, any information in the network system should be controllable within a certain transmission range and storage space. In addition to the conventional form of monitoring of transmission sites and transmission content, the most typical escrow policies such as passwords, when the encryption algorithm is managed by a third party, must be strictly implemented in accordance with the regulations.

    Principles of Information Security:Being granted only the appropriate permissions to access the information is known as the principle of minimization. The "right to know" of sensitive information must be restricted, which is a kind of restrictive openness under the premise of "satisfying the needs of work".

    The principle of minimization can be subdivided into the principles of what is necessary and what is necessary.

    2. The principle of separation of powers and checks and balances: In the information system, all the authorities should be appropriately divided, so that each authorized subject can only have a part of the authority, so that they can restrain and supervise each other, and jointly ensure the security of the information system. If the authority assigned by an authorized entity is too large and no one supervises and restricts it, it implies the potential safety hazards of "abuse of power" and "one-of-a-kind promise".

    3. The principle of security isolation: isolation and control are the basic methods to achieve information security, and isolation is the basis for control. One of the basic strategies of information security is to separate the subject and object of information, and implement the subject's access to the object under the premise of controllability and security according to a certain security policy.

    On the basis of these basic principles, people also summarize some implementation principles in the process of production practice, which are the concrete embodiment and expansion of the basic principles.

  5. Anonymous users2024-02-02

    The three elements of information security refer to confidentiality, integrity, and availability. All kinds of commercial and government affairs in human society are based on trust, and the previous seals, seals, signatures, etc. are important measures to achieve non-repudiation, and the non-repudiation of information is the same as avoiding the behavior of not recognizing the entity. The non-repudiation of nuclear power plants is divided into non-repudiation of nuclear power plants and non-repudiation of reception.

    The three elements of information security are introduced separately

    The confidentiality of information is relatively easy to understand, that is, information with a certain degree of confidentiality can only be read and changed by those who have the right to read or change it.

    The integrity of the information means that the original information cannot be allowed to be changed at will during the storage or transmission of the information. Such changes can be unintentional errors, such as input errors, software defects, to intentional human alterations and destruction.

    The availability of information means that the legitimate owners and users of the information should be guaranteed to receive the information they need in a timely manner whenever they need it.

  6. Anonymous users2024-02-01

    Information security is usually divided into five aspects, also known as the five major security, and they are:

    Confidentiality security: Confidentiality means that information can only be accessed and used by authorized persons or systems. Security measures to protect confidentiality include encryption, access control, identity authentication, and more.

    Integrity Security: Integrity means that the accuracy and integrity of the information can be protected from tampering, damage, or deletion by unauthorized persons or systems. Security measures to protect integrity include data verification, backup and restoration, access control, and more.

    Availability security: Availability means that the information system can be used normally when needed, and will not be affected by unexpected events or malicious attacks. Security measures to protect availability include backup and recovery, disaster recovery, and access control.

    Controllability and security: Controllability means that the operation and use of information systems are effectively monitored and managed, and potential security threats can be detected and prevented in a timely manner. Security measures to protect controllability include event monitoring, audit trails, behavioral analysis, and more.

    Trustworthiness security: Trustworthiness refers to the degree to which an information system can guarantee the user's trust in it. Security measures to protect trustworthiness include security authentication, digital certificates, security labels, and more.

    To sum up, the five security aspects of information security cover the core elements of information security, and enterprises and individuals need to comprehensively consider these five aspects when protecting information security and take corresponding measures to ensure information security.

  7. Anonymous users2024-01-31

    <> information security, ISO (International Organization for Standardization) defines as: the technical and management security protection established and adopted for the data processing system, in order to protect computer hardware, software, and data from being destroyed, altered and leaked due to accidental and malicious reasons.

    Information security refers to the protection of the software, hardware and various data running in the information system in the network information resources, so that it will not be tampered with, destroyed and leaked due to passive or active attacks, so as to ensure the safe, stable and reliable operation of the information system, so that the information service can maintain long-term continuity.

    Protect the security of personal information.

    The scope of information security can be summarized into the following five main contents: the security, confidentiality, integrity, authenticity and security of parasitic systems of unauthorized copy of information. The ultimate goal of information security is to take all security measures to protect the security of information so that it will not be damaged, so the information needs to be encrypted.

    In order to ensure the security of information resources, access control is required for information in the network, and the information source needs to be verified to ensure that no illegal software resides.

    Information security is a discipline involving many disciplines, including computer science, communication technology, cryptography technology, probability theory technology, information security technology, network technology, mathematical science, information theory, etc., and is a discipline with relatively high comprehensive requirements.

Related questions
10 answers2024-02-16

Information security technology is a professional course for undergraduate students majoring in information management and information systems. With the rapid development of computer technology, computer information security has attracted more and more attention. It is essential for students to master the necessary information security management and security prevention techniques. >>>More

5 answers2024-02-16

Generally, it refers to the protective measures (iron windows, surveillance, iron doors, iron filing cabinets, etc.) of the house where confidential records are stored. >>>More

10 answers2024-02-16

The positive effect is great.

Proof: The Positive Effects of Information The Negative Effects of Information. >>>More

9 answers2024-02-16

In this case, it is recommended to uninstall the third-party application software to view, it may be caused by the compatibility of the application software and the mobile phone, if this operation is still caused by the mobile phone, you need to restore the mobile phone to factory settings, please back up the important data stored on the mobile phone in advance before restoring the factory settings, such as: **book, short message, **, **file, etc., to prevent the data on the mobile phone from being lost and cannot be retrieved.

11 answers2024-02-16

Red, white, blue, white.

Names: Blue, White and Red Director: Krzysztov. Krysztof Kieslowski >>>More