Data in data security law refers to any electronic or other record of information. For example, personal identity information, personal web browsing records, consumption records, etc.
Data security refers to taking necessary measures to ensure that data is effectively protected and used legally, as well as having the ability to ensure continued security. It is necessary to ensure the security of the entire process of data processing, including data collection, storage, use, processing, transmission, provision, disclosure, etc.
Data processing, including data collection, storage, use, processing, transmission, provision, disclosure, etc. Data security refers to taking necessary measures to ensure that data is effectively protected and legally used, as well as having the ability to ensure continued security.
Data security features
(1) Confidentiality
Confidentiality, also known as confidentiality, means that the information of an individual or group is not accessible to others who should not who gets it. In computers, many software, including email software, web browsers, etc., have confidentiality-related settings to maintain the confidentiality of user information. In addition, spy files or hackers may cause confidentiality issues.
(2) Integrity
Data integrity is one of the three basic points of information security. It refers to ensuring that the information or data is not protected during the process of transmitting and storing information or data. Unauthorized tampering or rapid detection after tampering. When used in the field of information security, it is often confused with confidentiality boundaries.
Take ordinary RSA encryption of numerical information as an example. Without obtaining the key to decrypt the ciphertext, a hacker or malicious user can perform linear operations on the ciphertext to change the value of the numerical information accordingly. For example, the transaction amount is X yuan. By multiplying the ciphertext by 2, the transaction amount can be made 2X. Also called malleability. To solve the above problems, digital signatures or hash functions are usually used to protect ciphertext.
(3) Usability
Data usability is a user-centered design concept. The focus of usability design is to make the design of the product conform to the user's habits and habits. need.
Take the design of Internet websites as an example. We hope that users will not feel stressed or frustrated during the browsing process, and that users can maximize their use of website functions with the least effort. efficiency. For this reason, any violation of the "availability" of information is a breach of information security.