Information security, including the scope of their great, big military and political, such as national security secrets, of course, small-scale commercial enterprises including, for example, to prevent confidential leaks to prevent young people's views on the adverse information, the disclosure of such personal information. Network environment to ensure information security system is the key to information security, including computer security operating system, a variety of security protocols, security mechanisms (digital signatures, and information authentication, data encryption, etc.), until the security system, in which a security vulnerability can be threat to global security. Information security services to at least support the information network should include the basic theory of security services, as well as a new generation of information-based network architecture of network security services architecture.
Information refers to information network security hardware, software and data systems are protected from accidental or malicious destruction of reasons, change, disclosure, the system for normal operation of reliable, uninterrupted service.
Information security is one involving computer science, network technology, communication technology, cryptography, information security technology, applied mathematics, number theory, information theory, such as the integrated multi-disciplinary subjects.
In the broad sense, all related to the network of information confidentiality, integrity, availability, authenticity and control technologies and theoretical research is the field of network security.
The importance of information security
Information as a resource, it's universal, shared, value-added and more than capable of handling and the effectiveness of its human has special significance. The substance of information security is to protect the information system or information network of information resources from all types of threat, disturbance and destruction, that is, to ensure information security. According to the International Organization for Standardization definition of the meaning of information security mainly refers to the integrity of information, availability, confidentiality and reliability.
Information security is of any country, government, departments, industry must pay close attention to the problems that can not be ignored is a national security strategy. However, for different sectors and industries, its information security requirements and the focus is different.
China's reform and opening up have brought all aspects of the dramatic increase in the amount of information and requested the large-capacity, high-efficiency transmission of such information. In order to adapt to this situation, communication technology have taken place in the explosive growth of the unprecedented. At present, in addition to wire communications, the short-wave, wave, microwave, and satellite radio communications are also increasingly widely used. At the same time, foreign hostile forces in order to steal our country's political, military, economic, science and technology areas such as the secret information, the use of reconnaissance units, satellite and other means to form a fixed and mobile, remote and close, air and ground a combination of three-dimensional reconnaissance network, the interception of communications I transfer the information. www.hxw.red
From the literature insider knowledge of a society, has long been a common occurrence. In the 20th century after 50 years, from the community to understand their computer inside of a society, are becoming increasingly easy. Whether institutions or individuals, are an increasing number of the things entrusted to the computer to complete, sensitive information is through the fragile lines of communication between computer systems in the transmission, private information stored in the computer or from computer to computer transmission, electronic banking so that financial accounts may be available through the communication lines, the law enforcement agencies from the computer to understand the ex-offenders, doctors use computer management of medical records, ((All of this, the most important question is not illegal (unauthorized) access to (visit) does not increase conditions to prevent transmission of information.
Are many ways to transmit information, the local computer network, the Internet and distributed database, a cellular wireless, packet-switched wireless, satellite video conferencing, e-mail and other transmission technology. Information storage, processing and exchange process, there are secrets, or intercept, eavesdrop, the possibility of tampering and forgery. It is not difficult to see that a single security measures have been difficult to ensure that the security of communication and information must be integrated application of security measures, that is, through technology, management and administrative means, to achieve source, signal, information the protection of the three links in order to achieve the purpose of security of confidential information.
[Edit this paragraph] information security goals
◆ authenticity: the sources of information to judge, can be forged to identify sources of information.
◆ Confidentiality: to ensure that confidential information not tapped, or eavesdropping can not understand the true meaning of information.
◆ Integrity: to ensure the consistency of data to prevent data tampering by unauthorized users.
◆ Availability: to ensure that legitimate users of the use of information and resources will not be improperly refused.
◆ non-repudiation: the responsibility to establish an effective mechanism to prevent users deny their actions, this in e-commerce is extremely important.
◆ controllability: the spread of information and content control.
◆ may wish to review: the emerging network security issues and means of investigationhxw.red