1. In 1996, the "China Public Computer Internet International Networking Management Measures" was released.
2. In February 1994, the "Regulations on the Security Protection of Computer Information Systems of the People's Republic of China" was promulgated.
3. In February 1996, the "Interim Regulations on the Management of International Networking of Computer Information Networks of the People's Republic of China" was issued.
4. In December 1997, the "Interim Regulations on the Management of International Networking of Computer Information Networks of the People's Republic of China" was promulgated and implemented
5. Articles 185 and 286 of the new "Criminal Law" strip.
Information security problems are becoming increasingly diversified, customers need to solve more and more information security problems, and the information security methods required to solve these problems are increasing. Ensuring the security of computer information systems and networks, especially the security of important national infrastructure information systems, has become a major issue that must be solved in the process of informatization construction.
It is against this background that information security has been raised to an unprecedented height. The state has also put forward guidance requirements for the construction of information security from a strategic level.
Extended information:
The relationship between information security and technology can be traced back to ancient times. The Egyptians carved incomprehensible hieroglyphs on stone tablets; the Spartans used a tool called a cipher stick to convey military plans. Caesar the Great in the Roman era was one of the ancient generals who encrypted letters. According to the "Caesar cipher" It is said to be an encryption system used by Caesar in ancient Rome to protect important military information.
It is a substitution cipher that encrypts letters by pushing them back 3 digits in sequence, such as replacing the letter A with the letter D and the letter B with the letter E. Alan Turing, the father of British computer science, helped crack the German Navy's Enigma code at Bletchley Park in England, changing the course of World War II. The U.S. NIST divides information security controls into three categories.
(1) Technology, including products and processes (such as firewalls, anti-virus software, intrusion detection, encryption technology).
(2) Operations, mainly including strengthening mechanisms and methods, correcting operational defects, operational defects caused by various threats, physical access control, backup capabilities, and protection from environmental threats.
(3) Management, including usage policies, employee training, business planning, and non-technical areas based on information security. Information system security involves policies, regulations, education, management standards, technology, etc. No single level of security measures can provide comprehensive security, and security issues should be considered from the perspective of systems engineering. Figure 8-1 shows the NSTISSC security model.
Baidu Encyclopedia-Information Security Regulations