Traditional Culture Encyclopedia - Traditional customs - What stages of information security development has gone through
What stages of information security development has gone through
1, communication confidentiality stage: the main focus is on communication security, to ensure that information is not eavesdropped or tampered with during transmission. This phase began in the early days of communications technology, especially in the field of military and diplomatic communications, and landmark events include the application of cryptography during World War II and the theory of confidential communications proposed by Shannon.
2, computer security stage: with the widespread application of computer technology, the focus of information security turned to the security of computer systems, including operating system security, database security, network transmission security. This stage from the 1970s to the 1990s, accompanied by the emergence of computer viruses, the development of firewall technology and the progress of cryptographic algorithms.
3. Information security stage: the concept of information security is gradually improved, covering many aspects of information confidentiality, integrity, availability, non-repudiation and controllability. This stage is not only concerned about physical security, but also began to pay attention to logical security, software security, network security and other issues, the introduction of ISO27001 and other information security management system standards.
4, information security stage: further put forward the concept of information security, emphasizing the protection, detection, response, recovery and other all-round security of information systems. This stage pays more attention to security management, disaster recovery, emergency response and other practical operational level, as well as laws and regulations, organizational structure, personnel training and other aspects of security construction.
5, cyberspace security stage: with the popularization of the Internet and the arrival of the mobile Internet era, cyberspace security has become a new focus. This stage not only has to deal with traditional information security threats, but also has to face emerging challenges such as APT attacks, DDoS attacks, IoT security, cloud computing security, big data security, etc., and at the same time, it also promotes the introduction of national-level cybersecurity strategies and regulations.
6, Trusted Computing Stage: Focus on building a trusted computing environment based on hardware and chain of trust, establishing a full life cycle chain of trust from hardware, firmware, operating system to application layer to ensure that the entire information system is safe and trustworthy from the underlying hardware to the upper layer of applications.
- Related articles
- Top Ten Fresh Beef Brands in China
- Pulley wind
- How to make fried fruit
- What is traditional culture? What does traditional culture mean?
- What is the pen and ink of Chinese painting?
- How did ancient people make paper?
- Don't dig up material for your birthday-how to make a photo with a name to wish others a happy birthday?
- Parent-child activity program on the theme of the Spring Festival
- China's success in plant factories to achieve a breakthrough in rice cultivation 60 days harvest, what is the current level of technology?
- What are the special food snacks in Fuzhou?