Joke Collection Website - News headlines - Blackboard information of network security education

Blackboard information of network security education

Network security education blackboard template information picture 0 1

Network security education 02 blackboard template information map

Network security education blackboard template information picture 03 computer network security knowledge information

Security and Secrecy of Computer Information System

The security of computer information system refers to the security protection of computer information system and its stored information and data, related environment and places, and security products, to prevent leakage, theft and destruction, and to ensure the confidentiality, integrity, availability and non-repudiation of information mainly in the form of electromagnetic signals in the process of generation, storage, transmission and processing.

What should a secure computer information system achieve? Five no? :? Can't get in, can't get out, can't understand, can't get out, can't get out? , that is, illegal users cannot enter the system; Unauthorized users cannot take away information; Important information is encrypted, even if you see it, you can't understand it; Entering the system or illegally operating in the classified system will leave traces and will not be able to get away; Take away or tamper with the information, there will be relevant records, and you can't rely on it.

Outstanding problems faced by computer information system security management

In the face of the rapid development of computer information systems and security risks, security management is still not suitable, mainly in:

(A) the concept does not adapt. First, it emphasizes the application of network construction first, puts safety in a subordinate and secondary position, and lacks the investment of safety prevention facilities; Second, blind self-confidence, only taking simple or primary security precautions for network security and confidentiality construction, lacking overall consideration and long-term planning; Third, the brain is paralyzed and there are rules that are not followed.

(2) The classification and grading work is not suitable. Many low-density information networks are built according to high-density information networks, resulting in a waste of investment.

(3) The network construction is not suitable. Some classified networks didn't follow up? The construction of classified network must be synchronized with the construction of confidential facilities? Requirements, synchronous planning and implementation, and some have taken lower-level preventive measures, which are ineffective; Some deal with confidential information on unclassified networks; Some units store a large amount of state secret information on the server in the central computer room for the use of leading organs, but any unit at the grass-roots level can access the server by dialing the Internet and entering a simple password to obtain secret information, and so on.

(four) security, to prevent technical adaptation. The research and development of security technology lags behind the development and application of information technology, and a considerable number of hardware technologies and application systems cannot meet the security requirements.

5) Improper safety management measures. Some units have outdated safety systems and measures, and lack safety management regulations for the use of new technology products, which cannot meet the requirements of safety work. If some units are in a laissez-faire state in the management of classified magnetic media and optical media, they do not uniformly mark the classification, do not register the number for the record, and do not check regularly; Some units use classified media at will, and even use it to copy files on the external network; Some privately carry confidential laptops to go out or go home for use; Some units update and repair classified computers without degaussing hard disks, and so on.