Current location - Quotes Website - Signature design - What is information security?
What is information security?
Information security means that the hardware and software of the information network and the data in its system are protected from being destroyed, changed or leaked by accidents or malicious reasons, and the system runs continuously, reliably and normally without interrupting information services.

Information security is a comprehensive subject involving computer science, network technology, communication technology, cryptography technology, information security technology, applied mathematics, number theory, information theory and other disciplines. At present, there are several kinds of safety products that are popular in the market and can represent the future development direction:

◆ Firewall: A firewall can be said to be an access control product in a sense. It sets up a barrier between the internal network and the unsafe external network to prevent illegal access to internal resources from the outside and unsafe access from the inside to the outside. The main technologies are packet filtering technology, application gateway technology and proxy service technology. Firewall can effectively prevent hackers from using unsafe services to attack the intranet, and can realize the functions of monitoring, filtering, recording and reporting the data flow, and better cut off the connection between the intranet and the external network. But it may have its own security problems, or it may be a potential bottleneck.

◆ Secure router: Because WAN connection requires special router equipment, network transmission can be controlled through the router. Access control list technology is usually used to control network information flow.

◆ Virtual private network (VPN): Virtual private network (VPN) is to realize the interconnection between two or more trusted intranets by using data encryption technology and access control technology on the public data network. The construction of VPN usually needs to use a router or firewall with encryption function to realize the reliable transmission of data on public channels.

◆ Security server: The security server mainly aims at the security of information storage and transmission in a LAN, and its functions include the management and control of LAN resources, the management of users in the LAN, and the audit and tracking of all security-related events in the LAN.

Electronic Certification Authority-CA and PKI products: As the third party of communication, electronic certification authority (CA) provides reliable certification services for various services. CA can issue electronic visa certificates to users, and provide users with membership authentication, key management and other functions. PKI products can provide more functions and better services, and will become the core component of computing infrastructure for all applications.

◆ User authentication products: Due to the maturity and perfection of IC card technology, IC cards are more widely used to store users' personal private keys in user authentication products, and are combined with other technologies such as dynamic passwords to effectively identify users' identities. At the same time, the digital signature mechanism can be realized by combining the personal private key on the IC card with the digital signature technology. With the development of pattern recognition technology, advanced recognition technologies such as fingerprint, retina and facial features will also be put into use, and combined with existing technologies such as digital signature, the authentication and recognition of user identity will be more perfect.

◆ Security management center: Because there are many security products on the Internet and they are distributed in different places, it is necessary to establish a centralized management mechanism and equipment, namely the security management center. Used to distribute keys to network security devices, monitor the running status of network security devices and collect audit information of network security devices.

◆ Intrusion Detection System (IDS): As an effective supplement to traditional protection mechanisms (such as access control and identity identification), intrusion detection forms an indispensable feedback chain in information systems.

◆ Intrusion Prevention System (IPS): As a good supplement to IDS, intrusion prevention is a computer network hardware that plays an important role in the development of information security.

◆ Secure database: As a large amount of information is stored in the computer database, some information is valuable and sensitive and needs to be protected. A secure database can ensure the integrity, reliability, effectiveness, confidentiality, auditability, access control and user identification of the database.

◆ Secure operating system: provides a secure operating platform for key servers in the system, and constitutes a secure WWW service, a secure FTP service, a secure SMTP service, etc. , and as a solid foundation for various network security products to protect their own security.

◆DG figure document encryption: it can intelligently identify the confidential data running by the computer and automatically and forcibly encrypt all confidential data without manual participation. It embodies that everyone is equal before security. Solve the information leakage from the root

information security service

Information security service refers to the professional information technology services provided to ensure the integrity, confidentiality and availability of information and information systems, including consultation, integration, supervision, evaluation, certification, operation and maintenance, audit, training and risk assessment, disaster recovery and backup, emergency response, etc. You may be asking about computer security. To put it bluntly, you use some hacking techniques owned by honker to maintain Internet security. Of course, honker is better than a hacker. Theoretically, it is. If you are interested in network security, you can study hacking technology, but you can't use it to destroy it.