Basic Knowledge computer security technology

Source: Internet
Author: User

The security requirements of computer systems mainly include: confidentiality, security, integrity, reliability, usability, and the validity of the information rent legality confidentiality refers to the computer information storage and transmission should be confidential; security means that the program and data of an information system are not destroyed, not accessed and used by the outside world; Completeness means that information such as procedures and data should be complete to meet predetermined requirements; Reliability is the ability to ensure that system hardware and software have no faults or errors in order to complete the predetermined function under specified conditions; Availability is to ensure that legitimate users can use the normal, to prevent illegal users to access the system, Also to prevent the illegal operation or use of legitimate users; the validity and legality of information means that in the network application, the information receiving party should be able to confirm that the information content and order that it receives is true, not outdated, the two sides of the information exchange should be able to identify each other's identity, and the sender of the information cannot deny the information that has been sent. It is claimed that the information was forged by the receiving party and that the recipient of the information could not modify or falsify the information received, nor could it arrive at the information received.

According to the above security requirements, the security technology of computer system mainly consider the following aspects

(1) Solid security technology

Physical security mainly refers to the technology and methods adopted to ensure the safety of computer equipment, communication lines and related facilities. Mainly related to: computer system environmental security technology, fault diagnosis technology, anti-electromagnetic interference technology, electromagnetic leakage prevention technology, entity access control technology, media storage and management technology.

(2) Data security technology

Data security technology is to ensure that the database or data files in the computer system to avoid damage, modification, theft and the use of technical methods, mainly including user identification technology, password authentication technology, access control technology and data encryption technology, as well as the establishment of backup, offsite storage, proper custody and other techniques and methods.

(3) Software security technology

Software security technology is mainly meant to ensure that the software in the computer system, such as operating systems, database systems or applications, etc. from damage, illegal copying, illegal use. Or to avoid defects in the software itself and the use of technology and methods, including a variety of password control and identification technology, software encryption technology, software to prevent replication technology, Anti-dynamic tracking technology. Software development management technology, software testing technology, software safety standards.

(4) Network security technology

Network security technology refers to the technology and method used to guarantee the security of network and its nodes. It mainly includes message identification technology, digital signature technology, access control technology, data encryption technology, key management technology, security transmission media technology, network monitoring and tracking and isolation technology, routing control and Flow analysis control technology, network management technology, network firewall technology and so on.

(5) Operating security technology

Operation Safety technology includes safe operation and management technology, system use and maintenance technology, stochastic fault maintenance technology, software fault diagnosis technology, software reliability technology, software maintenance technology, operating system fault analysis and processing technology, computer room environment monitoring technology, equipment maintenance technology, power monitoring technology; The recording and statistic analysis technology of the system running state.

(6) Anti-virus technology

In order to prevent the computer system from virus invasion, in addition to the establishment of sound management measures, but also to grasp the virus scanning, detection and analysis technology, software itself anti-virus technology, system anti-virus technology, in the system after the virus destroyed data recovery technology, as well as the elimination of virus technology.

(7) Safety evaluation Technology

The security of computer systems is relative, there is no absolute security system, and the security of computer systems is the result of the balance between effect and cost. Different systems, different tasks and different scales have different requirements for the security level of information systems, so a safety evaluation standard is needed. As a test basis for system safety.

This article from the Internet and the search engine IT Technology blog http://www.guhongtao.com/issued reprint please be sure to indicate

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.