Is there anything safe?

Source: Internet
Author: User

I have been competing with information security. I once issued a question about the 163.com password. Years ago, I discovered that QQ had maliciously acquired passwords from countless fraudulent emails, later I found that the official QQ account was helping users leak their passwords, so I wrote them on the QQ signature.

Later, the csdn incident emerged, and I said on Weibo that many websites will have this problem. As a result, the password issue is getting worse and worse.

This is a joke. I cannot predict the occurrence of these events, let alone prevent them from happening. But I know that security has always been a heart disease for IT people, whether it is internal systems, external systems, or desktopProgramIt is still a fast-growing cloud computing. It is silly to mention security. Therefore, many developers who take security as their duty can render security issues with major events and make people believe that with their help, the information system is secure.

Security: I have many discussions, but I will not talk about them here.

I always want people to talk about security and explain the following problems in essence:

What is security and whether it is secure;

What is insecurity? Is it insecure.

Some people say that security is relative or absolute. Is it relative or absolute?

To what extent do people feel at ease? To what extent are people at ease, or do they harm people's interests?

 

In terms of security-related groups, security involves two groups: one for security and the other for security-related groups.

Why does someone require security? Does someone want security first or damage first?

Why can people who damage security gain benefits at will while those who damage security do nothing?

 

First, what is security?

Information security is always mentioned here. In fact, we can talk about information security from the actual security comparison.

In ancient times, when a person had worked hard to plant a few acres of wheat in the yard and prepared to spend the winter for the winter, he could be stolen by others at night. This was an insecure event, this leads to insecurity.

Why are the robbers robbing others of food? Because it is too hard, too time-consuming, and risky, it is possible that there is no harvest due to the weather. What makes it easy to get a harvest by stealing food?

Later, the farmers gathered people to take care of the field. If someone stole the food, they caught it and beat it to death or killed it directly. In this way, the grain stealing personnel should consider losing their lives? Or is it a little harder to plant your own crops? It is better to work hard and get rich. In this way, we will lose some people who steal food.

Many farmers gather together to eat, drink, and eat a lot of food every day, even more than waiting for food. If the farmers cannot afford it, they will be sent home.

In order to continue to ensure security, the field growers surrounded the courtyard and locked the door. In this way, the robbers were not very easy to come in and the food was relatively safe.

After a while, it was found that the door lock of the farmer was easily opened, and he stole his food while the farmer was asleep.

 

How is information security generated?

(Continue tomorrow)

 

Don't we need informatization without security?

Security issues.

Legal and sanction: how can we obtain evidence and sanction for security Destructors.

Penalties and security-related

Integrity and security are also related. In the process of business communication, information is exchanged instead of secrets.

In an insecure system, is the protection slightly or strictly protected?

How to run an information system in an insecure system?

 

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.