Traditional Culture Encyclopedia - Traditional culture - What are the basic characteristics of network security?
What are the basic characteristics of network security?
It refers to the characteristics that information can not be modified, destroyed or lost during transmission, exchange, storage and processing, that is, it can be generated, stored and transmitted correctly, which is the most basic security feature.
2. Confidentiality
It refers to the characteristic that information will not be leaked to unauthorized individuals, entities or processes or provided for their use according to given requirements, that is, it prevents useful information from being leaked to unauthorized individuals or entities and emphasizes the characteristic that useful information is only used by authorized objects.
3. Effectiveness
Refers to the characteristics that network information can be correctly accessed by authorized entities, and can be used normally or resumed under abnormal conditions as needed, that is, the required information can be correctly accessed when the system is running, and it can be quickly restored and put into use when the system is attacked or destroyed. Availability is a measure of the user-oriented security performance of network information system.
4. Non-repudiation
Refers to the communication between the two parties in the process of information interaction, convinced that the information provided by the participants themselves and participants is true, that is, it is impossible for all participants to deny or deny their true identity, as well as the authenticity of the information provided and the completed operations and commitments.
5. controllability
It refers to the characteristics that the information dissemination and specific content circulating in the network system can be effectively controlled, that is, any information in the network system should be controllable within a certain transmission range and storage space. In addition to the conventional monitoring of communication sites and communication contents, the most typical hosting strategies, such as passwords, must be strictly controlled and implemented when the encryption algorithm is managed by a third party.
- Related articles
- Dragon boat difference between elite open group and professional group
- What are the technological characteristics of lathe machining?
- Similarities and differences between Chinese characters and philology
- There is a saying in the countryside that "visitors don't serve three courses, but unfortunately nine people don't know". What does it mean?
- What are the pros and cons of smart projectors? Is it recommended to buy?
- The Significance of Ancient Human Resource Management
- What is the difference between GEM and A-share?
- Who has shocked you with their acting in the movie "Lake Changjin"?
- What is the specialty of Yancheng?
- What are the most promising and potential industries in China?