Traditional Culture Encyclopedia - Traditional festivals - Factors affecting information security do not include

Factors affecting information security do not include

Factors affecting information security do not include computer hardware factors.

Every security mechanism has a certain scope of application and application environment. A firewall is an effective security tool that hides the internal network structure and meticulously accesses the external network to the internal network. But for access between internal networks, firewalls are often powerless and difficult to detect and prevent.

Operating systems and application software usually have some bugs in them, which can be exploited by scheming employees or customers to launch an attack on an enterprise network, resulting in the loss of functionality of a program or network. Some may even steal confidential data, directly threatening the security of the enterprise network and enterprise data. Even security tools can be problematic.

The function of computer hardware for processing data is only a matter of hardware facilities and is not a factor in information security. Factors that affect security are external sabotage and causes inherent in the system.

Factors affecting the security of information systems

1, malicious attacks: active attacks refers to a variety of ways to selectively damage the information, such as modification, deletion, forgery, add, replay, disorganization, impersonation and so on. Passive attack refers to the detection, interception, theft, deciphering, etc. without interfering with the normal work of the network system.

2, security defects: security defects in network hardware: such as poor reliability, electromagnetic radiation, electromagnetic leakage, etc.; security defects in communication links: such as electromagnetic radiation, electromagnetic leakage, hitching, crosstalk, no link encryption.

3, software vulnerabilities: due to the complexity of the software program and the diversity of programming methods, the software system is very easy to intentionally or unintentionally leave some security holes that are not easy to be found, which will cause great network security problems, but also the entry point for hacker attacks.