What aspects does network information security include?

Network information security includes the following aspects:

1, network security model

When transmitting information on the network, both parties need to establish a logical channel between sending and receiving. This requires first determining the route from the sender to the receiver, and then selecting the communication protocol used on this route, such as TCP/IP.

2. Information security framework

Network information security can be regarded as a collection of multiple security units. Among them, each unit is a whole and contains many characteristics. Generally speaking, people understand network information security from three main features-security features, security levels and system units.

3. Security extension

Network information security is often based on the security deployment of systems and computers. It is easy to forget that talents are the weak point in this network information security, and social engineering attacks are the way to break this weak point. Social engineering is an attack that takes advantage of human psychological manifestations such as fragility and greed, and it is hard to prevent.

Extended data:

The main characteristics of network information security:

1, integrity

It refers to the characteristics that information can not be modified, destroyed or lost during transmission, exchange, storage and processing, that is, it can be generated, stored and transmitted correctly, which is the most basic security feature.

2. Confidentiality

It refers to the characteristic that information will not be leaked to unauthorized individuals, entities or processes or provided for their use according to given requirements, that is, it prevents useful information from being leaked to unauthorized individuals or entities and emphasizes the characteristic that useful information is only used by authorized objects.

3. Effectiveness

Refers to the characteristics that network information can be correctly accessed by authorized entities, and can be used normally or resumed under abnormal conditions as needed, that is, the required information can be correctly accessed when the system is running, and it can be quickly restored and put into use when the system is attacked or destroyed. Availability is a measure of the user-oriented security performance of network information system.

4. Non-repudiation

Refers to the communication between the two parties in the process of information interaction, convinced that the information provided by the participants themselves and participants is true, that is, it is impossible for all participants to deny or deny their true identity, as well as the authenticity of the information provided and the completed operations and commitments.

5, controllability

It refers to the characteristics that the information dissemination and specific content circulating in the network system can be effectively controlled, that is, any information in the network system should be controllable within a certain transmission range and storage space. In addition to the conventional monitoring of communication sites and communication contents, the most typical hosting strategies, such as passwords, must be strictly controlled and implemented when the encryption algorithm is managed by a third party.

Baidu Encyclopedia-Network Information Security