Current location - Quotes Website - Signature design - What technologies are used in computer networks to ensure the integrity of information?
What technologies are used in computer networks to ensure the integrity of information?

In computer networks, message authentication code (MAC) or digital signature mechanisms are used to achieve integrity protection.

The five major characteristics of network information security: ① integrity, ② confidentiality, ③ availability, ④ non-repudiation, and ⑤ controllability. Taken together, they ensure the effectiveness of electronic information.

1. Integrity: refers to the characteristics of non-modification, non-destruction and non-loss of information during transmission, exchange, storage and processing, that is, maintaining the originality of information so that information can be correctly generated, stored and transmitted. , which is the most basic security feature.

2. Confidentiality: refers to the fact that information is not leaked to unauthorized individuals or entities according to given requirements, that is, it prevents useful information from being leaked to unauthorized individuals or entities, emphasizing that useful information can only be used by authorized objects. .