Home Common Problem Information security protects data

Information security protects data

Jan 13, 2021 pm 03:34 PM
information security Data protection

Information security is to protect the "availability", "confidentiality", "integrity", "controllability" and "auditability" of data. Information security is to protect computer hardware, software, and data from being damaged, altered, and leaked due to accidental and malicious reasons.

Information security protects data

The operating environment of this tutorial: Windows 7 system, Dell G3 computer.

Information security, ISO (International Organization for Standardization) defines it as: the technical and managerial security protection established and adopted for data processing systems in order to protect computer hardware, software, and data from accidental and malicious destroyed, altered and leaked for any reason.

There are 5 criteria to measure whether information is safe:

(1) Integrity of information, ensuring that the information is not exposed to unauthorized users or processes, that is, the original data of the information cannot be illegally obtained or modified. , it is the basis for ensuring the reliability of information;

(2) Availability of information, authorized legal users or processes can access the corresponding authorized information data at any time as long as needed (even if there is an attacker, the attacker cannot Occupying all resources and hindering the work of the authorizer);

(3) Confidentiality of information, only authorized people can modify the data, and deny illegal access;

(4) The controllability of information can control the flow and behavior of information within the scope of authorization;

(5) The reviewability of information can provide the basis and means for investigating network security issues that arise. . These five metrics can only qualitatively measure network security.

Related expansion introduction:

The full name of the International Organization for Standardization (International Organization for standardization) and the abbreviation (ISO) are not exactly the same. In fact, "ISO" is an etymology derived from the Greek word meaning "equal."

From "equal" to "standard", the idea of ​​using "ISO" as the name of the organization seems very logical. In addition, ISO is used as a name to represent the organization throughout the world, thus avoiding the different situations that arise when member groups use different national languages ​​to convert "International Organization for Standardization" into acronyms. No matter which country it is in, The abbreviation of the organization has always been "ISO".

The purpose and purpose of the International Organization for Standardization is:

"To promote the development of standardization work worldwide to facilitate international material exchange and services, and to expand the scope of knowledge, science, technology and Economic cooperation." Its main activities are to formulate international standards, coordinate worldwide standardization work, organize members and technical committees to exchange information, cooperate with other international organizations, and jointly study related standardization issues.

Related recommendations: " Programming Learning Website"

The above is the detailed content of Information security protects data. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to protect data on CentOS servers using secure file system encryption How to protect data on CentOS servers using secure file system encryption Jul 07, 2023 pm 02:22 PM

How to protect data on CentOS servers using secure file system encryption In today’s digital age, data security has become even more important. Especially sensitive data stored on servers, if not properly protected, may be attacked by hackers, leading to serious consequences. In order to ensure data confidentiality and integrity, we can use file system encryption to protect data on the CentOS server. This article will explain how to use secure file system encryption to protect data on CentOS servers and

What does edr mean in network security? What does edr mean in network security? Aug 29, 2022 pm 02:25 PM

In network security, EDR refers to "Endpoint Detection and Response". It is a proactive endpoint security solution that includes real-time monitoring and the use of automatic threat response mechanisms to collect endpoint security data; by recording terminal and network events, this information is stored locally. stored on endpoints or centrally in a database. EDR will collect known attack indicators, behavioral analysis databases to continuously search data and machine learning technology to monitor any possible security threats and respond quickly to these security threats.

ViewState in Yii Framework: Implementing Data Protection ViewState in Yii Framework: Implementing Data Protection Jun 21, 2023 am 09:02 AM

ViewState is a mechanism in ASP.NET used to protect the private data of the page. In the Yii framework, ViewState is also an important means to achieve page data protection. In web development, as the complexity of user interface operations increases, data transmission between the front end and the back end becomes more frequent. However, it is inevitable that malicious users will intercept data through network packet capture and other means. Unprotected data may contain important information such as user privacy, order information, financial data, etc. Therefore, encrypted transmission

What level of information is transmitted using an encrypted fax machine? What level of information is transmitted using an encrypted fax machine? Aug 31, 2022 pm 02:31 PM

"Confidential" and "Secret". Do not use ordinary telephones or fax machines to discuss or transmit confidential information. To fax confidential information, you must use an encrypted fax machine approved by the national cryptography management department. It is strictly forbidden to use an unencrypted fax machine to transmit state secrets. Encrypted fax machines can only transmit confidential and confidential information, and top-secret information should be sent to local confidential departments for translation.

What is the difference between cybersecurity and information security? What is the difference between cybersecurity and information security? Jun 11, 2023 pm 04:21 PM

With the advent of the digital age, network security and information security have become indispensable topics. However, many people are not clear about the difference between these two concepts. This article will provide a detailed analysis in terms of definition, scope, threats, etc. 1. Definition and Category Differences Network security refers to a technology that protects the security of the network and the hardware, software, data and other resources involved in its operation. Specifically, network security includes the following aspects: network infrastructure, network application services, network data and information flow, network security management and monitoring, network protocols and transmission security.

Java Framework Data Protection and Privacy Measures Java Framework Data Protection and Privacy Measures Jun 04, 2024 pm 02:22 PM

The Java framework provides the following data protection and privacy measures: Data encryption (SpringSecurity, Hibernate) Access control (SpringSecurity, SpringHATEOAS) Data masking (ApacheDeidentifier) ​​Logging (Log4j2, SpringBootActuator)

What are the five basic elements of information security? What are the five basic elements of information security? Sep 13, 2023 pm 02:35 PM

The five basic elements of information security are confidentiality, integrity, availability, non-repudiation and auditability. Detailed introduction: 1. Confidentiality is to ensure that information can only be accessed and used by authorized people or entities to prevent unauthorized disclosure or disclosure. In order to maintain confidentiality, encryption technology can be used to encrypt sensitive information and only authorized personnel To decrypt and access; 2. Integrity refers to ensuring the accuracy and integrity of information during storage, transmission and processing, and preventing information from being tampered with, modified or damaged. In order to maintain integrity, data integrity checks can be used, etc. .

Analysis of encryption and decryption technology of PHP security sensitive data Analysis of encryption and decryption technology of PHP security sensitive data Jun 30, 2023 pm 02:01 PM

Analysis of Security Sensitive Data Encryption and Decryption Technology in PHP With the development of the Internet, data security has become an important issue. For website developers, how to protect users' sensitive data is particularly important. In PHP, we can use various encryption and decryption technologies to protect sensitive data. This article will provide an in-depth analysis of security sensitive data encryption and decryption technologies in PHP. 1. Basic principles of encryption Encryption is the process of converting plain text into cipher text. Only the person who has the key can decrypt the cipher text and restore it to plain text. In PHP, common encryption methods