信息安全基础.doc

上传人:11****ws 文档编号:3071535 上传时间:2019-05-20 格式:DOC 页数:4 大小:15.39KB
下载 相关 举报
信息安全基础.doc_第1页
第1页 / 共4页
信息安全基础.doc_第2页
第2页 / 共4页
信息安全基础.doc_第3页
第3页 / 共4页
信息安全基础.doc_第4页
第4页 / 共4页
亲,该文档总共4页,全部预览完了,如果喜欢就下载吧!
资源描述

1、 Introduction to Information Security As of January 2008, the internet connected an estimated 541.7 million computers in more than 250 countries on every continent, even Antarctica (Source: Internet Software Consortiums Internet Domain Survey; www.isc.org/index.pl). The internet is not a single netw

2、ork, but a worldwide collection of loosely connected networks that are accessible by individual computer hosts, in a variety of ways, to anyone with a computer and a network connection. Thus, individuals and organizations can reach any point on the internet without regard to national or geographic b

3、oundaries or time of day. However, along with the convenience and easy access to information come risks. Among them are the risks that valuable information will be lost, stolen, changed, or misused. If information is recorded electronically and is available on networked computers, it is more vulnera

4、ble than if the same information is printed on paper and locked in a file cabinet. Intruders do not need to enter an office or home; they may not even be in the same country. They can steal or tamper with information without touching a piece of paper or a photocopier. They can also create new electr

5、onic files, run their own programs, and hide evidence of their unauthorized activity. Basic Security Concepts Three basic security concepts important to information on the internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authenti

6、cation, authorization, and nonrepudiation. When information is read or copied by someone not authorized to do so, the result is known as loss of confidentiality. For some types of information, confidentiality is a very important attribute. Examples include research data, medical and insurance record

7、s, new product specifications, and corporate investment strategies. In some locations, there may be a legal obligation to protect the privacy of individuals. This is particularly true for banks and loan companies; debt collectors; businesses that extend credit to their customers or issue credit card

8、s; hospitals, doctors offices, and medical testing laboratories; individuals or agencies that offer services such as psychological counseling or drug treatment; and agencies that collect taxes. Information can be corrupted when it is available on an insecure network. When information is modified in

9、unexpected ways, the result is known as loss of integrity. This means that unauthorized changes are made to information, whether by human error or intentional tampering. Integrity is particularly important for critical safety and financial data used for activities such as electronic funds transfers,

10、 air traffic control, and financial accounting. Information can be erased or become inaccessible, resulting in loss of availability. This means that people who are authorized to get information cannot get what they need. Availability is often the most important attribute in service-oriented business

11、es that depend on information (for example, airline schedules and online inventory systems). Availability of the network itself is important to anyone whose business or education relies on a network connection. When users cannot access the network or specific services provided on the network, they e

12、xperience a denial of service. To make information available to those who need it and who can be trusted with it, organizations use authentication and authorization. Authentication is proving that a user is the person he or she claims to be. That proof may involve something the user knows (such as a

13、 password), something the user has (such as a “smartcard”), or something about the user that proves the persons identity (such as a fingerprint). Authorization is the act of determining whether a particular user (or computer system) has the right to carry out a certain activity, such as reading a fi

14、le or running a program. Authentication and authorization go hand in hand. Users must be authenticated before carrying out the activity they are authorized to perform. Security is strong when the means of authentication cannot later be refutedthe user cannot later deny that he or she performed the a

15、ctivity. This is known as nonrepudiation. These concepts of information security also apply to the term information security; that is, internet users want to be assured that they can trust the information they use the information they are responsible for will be shared only in the manner that they e

16、xpect the information will be available when they need it the systems they use will process information in a timely and trustworthy manner In addition, information assurance extends to systems of all kinds, including large-scale distributed systems, control systems, and embedded systems, and it enco

17、mpasses systems with hardware, software, and human components. The technologies of information assurance address system intrusions and compromises to information. What Can Happen It is remarkably easy to gain unauthorized access to information in an insecure networked environment, and it is hard to

18、catch the intruders. Even if users have nothing stored on their computer that they consider important, that computer can be a “weak link,” allowing unauthorized access to the organizations systems and information. Seemingly innocuous information can expose a computer system to compromise. Informatio

19、n that intruders find useful includes which hardware and software are being used, system configuration, type of network connections, phone numbers, and access and authentication procedures. Security-related information can enable unauthorized individuals to access important files and programs, thus

20、compromising the security of the system. Examples of important information are passwords, access control files and keys, personnel information, and encryption algorithms. No one on the internet is immune. Those affected include banks and financial companies, insurance companies, brokerage houses, co

21、nsultants, government contractors, government agencies, hospitals and medical laboratories, network service providers, utility companies, the textile business, universities, and wholesale and retail trades. The consequences of a break-in cover a broad range of possibilities: a minor loss of time in

22、recovering from the problem, a decrease in productivity, a significant loss of money or staff-hours, a devastating loss of credibility or market opportunity, a business no longer able to compete, legal liability, and the loss of life. Individuals may find that their credit card, medical, and other private information has been compromised. Identity theft can affect anyone.

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 实用文档资料库 > 策划方案

Copyright © 2018-2021 Wenke99.com All rights reserved

工信部备案号浙ICP备20026746号-2  

公安局备案号:浙公网安备33038302330469号

本站为C2C交文档易平台,即用户上传的文档直接卖给下载用户,本站只是网络服务中间平台,所有原创文档下载所得归上传人所有,若您发现上传作品侵犯了您的权利,请立刻联系网站客服并提供证据,平台将在3个工作日内予以改正。