Traditional Culture Encyclopedia - Traditional stories - Information protection methods can be roughly divided into

Information protection methods can be roughly divided into

Information security mainly includes the following five aspects, that is, the confidentiality, authenticity, integrity, unauthorized copying and security of the parasitic system need to be ensured. Information security itself covers a wide range, including how to prevent the leakage of commercial enterprise secrets, prevent teenagers from browsing inappropriate information, and prevent the leakage of personal information, etc. The information security system in the network environment is the key to ensuring information security, including computer security operating systems, various security protocols, security mechanisms (digital signatures, message authentication, data encryption, etc.), up to security systems, such as UniNAC, DLP, etc., as long as Security vulnerabilities can threaten global security. Information security means that information systems (including hardware, software, data, people, physical environment and infrastructure) are protected from damage, alteration, and leakage by accidental or malicious reasons, and that the system operates continuously, reliably and normally, Information services are not interrupted, ultimately achieving business continuity.

The discipline of information security can be divided into two levels: narrow security and broad security. Security in the narrow sense is based on the field of computer security based on cryptography. In the early days, China's information security majors usually used this as a benchmark and supplemented it. In terms of computer technology, communication network technology and programming, information security in a broad sense is a comprehensive subject, from traditional computer security to information security. Not only is the name changed, but it is also an extension of security development. Security is no longer simply It is a technical issue, but the product of combining management, technology, legal and other issues. This major cultivates senior information security professionals who can engage in computer, communications, e-commerce, e-government, e-finance and other fields.