Home > Common Problem > What are the three basic attributes of information security?

What are the three basic attributes of information security?

青灯夜游
Release: 2021-11-08 11:58:51
Original
106420 people have browsed it

There are three basic attributes of information security: 1. Confidentiality, which refers to the characteristic that information is not leaked to or used by unauthorized individuals and entities; 2. Integrity, which refers to the fact that information is stored, It maintains the characteristics of not being modified, delayed, out of order, and not lost during the process of transmission and extraction; 3. Availability refers to the characteristics that information can be accessed by legitimate users and used in the required order.

What are the three basic attributes of information security?

The operating environment of this tutorial: Windows 7 system, Dell G3 computer.

Information security (information security) involves information theory, computer science, cryptography and other aspects of knowledge. It studies the protection methods of information in computer systems and communication networks. It refers to the generation, transmission, use, and During the storage process, security protection is provided for information carriers (processing carriers, storage carriers, transmission carriers) and information processing, transmission, storage, and access to prevent data information content or capabilities from being illegally used or tampered with.

The main information security threats include passive attacks, active attacks, insider attacks and distribution attacks. The main information security technologies include cryptography technology, identity management technology, rights management technology, local computing environment security technology, and firewall technology. etc., the development of information security has gone through stages such as communication confidentiality, computer security, information security and information assurance.

Three basic attributes of information security

1. Confidentiality

Information confidentiality Also known as information confidentiality, it refers to the characteristic that information is not disclosed to or used by unauthorized individuals and entities. Confidentiality of information varies with how many people the information is allowed to access.

The information that can be accessed by all personnel is public information, and the information that needs to be restricted is generally sensitive information or secrets. Secrets can be divided into different confidentiality levels according to the importance of the information or confidentiality requirements. For example, the state imposes restrictions on secret leaks. Depending on the impact (consequences) on national economic and security interests, national secrets are divided into three levels: A (secret level), B (confidential level) and C (top secret level).

Secrets cannot be leaked to unauthorized users or used illegally. Even if unauthorized users obtain the information, they cannot know the content of the information. Confidentiality usually uses access control to prevent unauthorized users from obtaining confidential information, and encryption technology to prevent unauthorized users from learning the information content.

2. Integrity

Integrity means that the information remains unmodified, delayed, out of order and unobstructed during the storage, transmission and retrieval process. Lost properties. Generally, access control is used to prevent tampering, and information digest algorithms are used to check whether the information has been tampered with. Integrity is the characteristic that data cannot be changed without authorization. Its purpose is to ensure that the data on the information system is in a complete and undamaged state.

3. Availability

Information availability refers to the characteristics that information can be accessed by legitimate users and can be used in the required order, that is, the required information can be obtained when needed. information. Availability is a measure of the reliability of information resource service functions and performance, and is a requirement for the overall reliability of the information system. At present, there is no particularly effective method to ensure that the system and network can provide normal services except for backup and redundant configuration.

For more related knowledge, please visit the FAQ column!

The above is the detailed content of What are the three basic attributes of information security?. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template