Home>Article> What are the technical characteristics of network information security?

What are the technical characteristics of network information security?

Linda Hamilton
Linda Hamilton Original
2021-01-28 17:29:58 20454browse

The technical characteristics of network information security are: 1. Integrity; refers to the characteristics of information maintaining non-modification, non-destruction and non-loss during transmission, exchange, storage and processing. 2. Confidentiality; refers to the characteristic that information is not disclosed to unauthorized individuals, entities or processes according to given requirements, or provided for their use. 3. Availability. 4. Non-repudiation. 5. Controllability.

What are the technical characteristics of network information security?

The operating environment of this tutorial: Windows 7 system, Dell G3 computer.

Network information security is a comprehensive discipline involving computer science, network technology, communication technology, cryptography technology, information security technology, applied mathematics, number theory, information theory and other disciplines.

It mainly means that the hardware, software of the network system and the data in the system are protected from damage, alteration, and leakage due to accidental or malicious reasons. The system operates continuously, reliably and normally, and the network Service is uninterrupted.

Main Features

1. Integrity

means that information remains unmodified, undamaged and unlost during transmission, exchange, storage and processing. characteristics, that is, maintaining the integrity of information so that information can be correctly generated, stored, and transmitted. This is the most basic security feature.

2. Confidentiality

refers to the characteristics of information not being leaked to unauthorized individuals, entities or processes according to given requirements, or providing their utilization, that is, preventing useful information from being leaked to unauthorized individuals or entity, emphasizing the characteristic that useful information can only be used by authorized objects.

3. Availability

refers to the characteristics that network information can be correctly accessed by authorized entities and can be used normally as required or can be restored to use under abnormal circumstances, that is, it can be used correctly when the system is running. Access the required information, and when the system is attacked or damaged, it can be quickly restored and put into use. Availability is a measure of the user-facing security performance of network information systems.

4. Non-repudiation

means that during the information exchange process, both parties in the communication are convinced that the participants themselves and the true identity of the information provided by the participants, that is, it is impossible for all participants Deny or deny one’s true identity, as well as the authenticity of the information provided and the completed operations and commitments.

5. Controllability

refers to the characteristic of being able to effectively control the dissemination and specific content of information circulating in the network system, that is, any information in the network system must be within a certain transmission range and Controllable within the storage space. In addition to the conventional monitoring of dissemination sites and dissemination content, the most typical custody policy such as passwords, when the encryption algorithm is managed by a third party, must be strictly controlled and implemented in accordance with regulations.

For more programming-related knowledge, please visit:Programming Teaching! !

The above is the detailed content of What are the technical characteristics of network information security?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Previous article:What are the data types? Next article:What are the data types?