1, confidentiality:
Ensure that information is not exposed to unauthorized entities or processes. ?
2. Integrity:
Only authorized people can modify the data and judge whether the data has been tampered with. ?
3. Availability:
Authorized entities can access data when needed, that is, attackers can't occupy all resources and hinder the work of the authorizer. ?
4. controllability:
You can control the information flow and behavior within the scope of authorization. ?
5. Auditability:
Provide basis and means for investigating emerging network security issues. ?
Information security is to protect information and information systems from unauthorized entry, use, disclosure, destruction, modification, inspection, recording and destruction. In order to ensure information security, it is necessary to carry out information source authentication and access control, and there must be no illegal software resident or unauthorized operation.
The concept of information security has experienced a long historical stage in the 20th century, and has been deepening since 1990s. Entering the 2 1 century, with the continuous development of information technology, the problem of information security has become increasingly prominent. How to ensure the security of information system has become a concern of the whole society.
Employment direction of information security major:
1, information security major
After graduation, I can engage in the research, design, development and management of various information security systems and computer security systems in government agencies, national security departments, banks, finance, securities, communications and other departments, and I can also engage in computer applications in the IT field.
2. Information expertise
Information security major is one of the undergraduate majors in colleges and universities, which belongs to computer major. Moreover, information security major is a professional course that can cultivate all-round development of quality, knowledge and ability. At the same time, he also has basic scientific knowledge such as natural science, humanities and information science.
3, master professional technology
This major has mastered the basic theory, basic technology and application knowledge in the field of information security, among which there are also information security science and technology talents with the ability of information security scientific research, technology development and application service. With these, we can engage in information security, information science, information technology, technology development and application services.