Joke Collection Website - Public benefit messages - What is information security?
What is information security?
First, confidentiality.
The feature that information will not be disclosed or used by unauthorized users, entities or processes. Confidentiality means that information in the network will not be obtained and used by unauthorized entities. This information includes not only state secrets, but also business secrets or work secrets of enterprises and social groups, as well as personal information. When people apply the network, they naturally require the network to provide security services, and the information that is kept secret includes both the information transmitted in the network and the information stored in the computer system.
Second, honesty.
The characteristics of data cannot be changed without authorization. In other words, information remains unchanged, not destroyed or lost during storage or transmission. Data integrity refers to ensuring that the data and information on the computer system are in an intact state, that is, the data will not be changed or lost due to intentional or unintentional events. In addition to the fact that the data itself cannot be destroyed, the integrity of the data also requires the correctness and credibility of the data source, which means that the authenticity of the data should be verified first, and then whether the data is destroyed.
Third, usability.
Availability refers to the expected ability to use information or resources, that is, the characteristics of authorized entities or users to access and use information as required. Simply put, it is to ensure that information can be used by authorized people when needed, and to prevent the system from refusing service due to subjective and objective factors. For example, denial of service in the network environment, destroying the normal operation of the network and related systems, are all attacks on usability.
Fourth, controllability.
Controllability refers to people's ability to control the transmission path, scope and content of information, that is, bad content is not allowed to spread through public networks, so that information is under the effective control of legitimate users.
Fifth, there is no denying.
The so-called undeniable. In the process of information exchange, we are convinced of the true unity of the participants, that is, all participants can't deny or deny the completed operation or commitment. Simply put, the sender can't deny that he sent the message, and the receiver can't deny that he received the message.
- Previous article:Why do you always get messages from green tea?
- Next article:What is the reason why Huawei's mobile phone suddenly can't receive SMS?
- Related articles
- Where is the visitor mode setting of Huawei mobile phone?
- How to move files from Apple phone to OPPO phone
- Send a text message to your lover
- A word of congratulations on the birth of a son
- publicity programme
- Who can send a message to celebrate the New Year in the Year of the Tiger?
- Xiamen built a shelter overnight.
- Software for simulating love chat
- Do you deduct money from Alipay SMS? How to check?
- Organize a full-moon banquet invitation letter for a newborn daughter. How to write a full-moon banquet invitation letter for a baby girl.