Illegal tampering of data destroys the confidentiality attribute of information security. Confidentiality is also called confidentiality. It, together with Integrity and Availability, are called the three CIA elements of information security.
Confidentiality refers to the fact that network information is not disclosed to unauthorized users, entities or processes. That is, the information is only available to authorized users.Confidentiality is an important means to ensure network information security based on reliability and availability. (Recommended learning:web front-end video tutorial)
Confidentiality in network information security means that information is not leaked to unauthorized individuals, entities or processes according to given requirements, or provided for their use The characteristic is to prevent the leakage of useful information to unauthorized individuals or entities, emphasizing the characteristic that useful information can only be used by authorized objects.
Commonly used confidentiality technologies
(1) Physical confidentiality: Use various physical methods, such as restrictions, isolation, masking, control and other measures to protect information from being leaked [1] .
(2) Anti-eavesdropping: Make the opponent unable to detect useful information.
(3) Radiation protection: Prevent useful information from being radiated in various ways.
(4) Information encryption: Under the control of the key, the information is encrypted using an encryption algorithm. Even if the opponent obtains the encrypted information, he will not be able to read the valid information because he does not have the key.
For network security, it includes two aspects: On the one hand, it includes physical security, which refers to the protection of tangible items such as communication, computer equipment and related facilities in the network system to prevent them from getting wet by rain, etc. . On the other hand, it also includes what we usually call logical security.
Includes information integrity, confidentiality, availability, etc. Both physical security and logical security are very important. If either aspect is not protected, network security will be affected. Therefore, when carrying out security protection, reasonable arrangements must be made to take both aspects into consideration.
International research on information security started early and invested heavily. It has achieved many results and has been promoted and applied.
China already has a number of research institutions and high-tech enterprises specializing in basic research, technology development and technical services of information security, forming the prototype of China's information security industry. However, due to the lack of technical talents specialized in information security work in China A serious shortage has hindered the development of China's information security industry. The information security major is a very promising major.
The above is the detailed content of What attribute of information security is destroyed by illegal tampering of data?. For more information, please follow other related articles on the PHP Chinese website!