全文预览已结束
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Introduction to Information Security As of January 2008, the internet connected an estimated 541.7 million computers in more than 250 countries on every continent, even Antarctica (Source: Internet Software Consortiums Internet Domain Survey; /index.pl). The internet is not a single network, but a worldwide collection of loosely connected networks that are accessible by individual computer hosts, in a variety of ways, to anyone with a computer and a network connection. Thus, individuals and organizations can reach any point on the internet without regard to national or geographic boundaries or time of day. However, along with the convenience and easy access to information come risks. Among them are the risks that valuable information will be lost, stolen, changed, or misused. If information is recorded electronically and is available on networked computers, it is more vulnerable than if the same information is printed on paper and locked in a file cabinet. Intruders do not need to enter an office or home; they may not even be in the same country. They can steal or tamper with information without touching a piece of paper or a photocopier. They can also create new electronic files, run their own programs, and hide evidence of their unauthorized activity. Basic Security Concepts Three basic security concepts important to information on the internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authentication, authorization, and nonrepudiation. When information is read or copied by someone not authorized to do so, the result is known as loss of confidentiality. For some types of information, confidentiality is a very important attribute. Examples include research data, medical and insurance records, new product specifications, and corporate investment strategies. In some locations, there may be a legal obligation to protect the privacy of individuals. This is particularly true for banks and loan companies; debt collectors; businesses that extend credit to their customers or issue credit cards; hospitals, doctors offices, and medical testing laboratories; individuals or agencies that offer services such as psychological counseling or drug treatment; and agencies that collect taxes. Information can be corrupted when it is available on an insecure network. When information is modified in unexpected ways, the result is known as loss of integrity. This means that unauthorized changes are made to information, whether by human error or intentional tampering. Integrity is particularly important for critical safety and financial data used for activities such as electronic funds transfers, air traffic control, and financial accounting. Information can be erased or become inaccessible, resulting in loss of availability. This means that people who are authorized to get information cannot get what they need. Availability is often the most important attribute in service-oriented businesses that depend on information (for example, airline schedules and online inventory systems). Availability of the network itself is important to anyone whose business or education relies on a network connection. When users cannot access the network or specific services provided on the network, they experience a denial of service. To make information available to those who need it and who can be trusted with it, organizations use authentication and authorization. Authentication is proving that a user is the person he or she claims to be. That proof may involve something the user knows (such as a password), something the user has (such as a “smartcard”), or something about the user that proves the persons identity (such as a fingerprint). Authorization is the act of determining whether a particular user (or computer system) has the right to carry out a certain activity, such as reading a file or running a program. Authentication and authorization go hand in hand. Users must be authenticated before carrying out the activity they are authorized to perform. Security is strong when the means of authentication cannot later be refutedthe user cannot later deny that he or she performed the activity. This is known as nonrepudiation. These concepts of information security also apply to the term information security; that is, internet users want to be assured that they can trust the information they use the information they are responsible for will be shared only in the manner that they expect the information will be available when they need it the systems they use will process information in a timely and trustworthy manner In addition, information assurance extends to systems of all kinds, including large-scale distributed systems, control systems, and embedded systems, and it encompasses systems with hardware, software, and human components. The technologies of information assurance address system intrusions and compromises to information. What Can Happen It is remarkably easy to gain unauthorized access to information in an insecure networked environment, and it is hard to catch the intruders. Even if users have nothing stored on their computer that they consider important, that computer can be a “weak link,” allowing unauthorized access to the organizations systems and information. Seemingly innocuous information can expose a computer system to compromise. Information that intruders find useful includes which hardware and software are being used, system configuration, type of network connections, phone numbers, and access and authentication procedures. Security-related information can enable unauthorized individuals to access important files and programs, thus compromising the security of the system. Examples of important information are passwords, access control files and keys, personnel information, and encryption algorithms. No one on the internet is immune. Those affected include banks and financial companies, insurance companies, brokerage houses, consultan
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2026届北京八中怡海分校高三化学第一学期期末教学质量检测模拟试题含解析
- 甘肃省小学六年级下学期数学应用题专项-比例尺应用题分类
- 气瓶安全技术与管理课件
- 幼儿园安全意识培训课件
- 云计算基础技术与应用-题库习题及答案 11. Web服务、12. 公有云平台
- 老年人消防安全讲座课件
- DB34-T 5300-2025 智能终端屏幕信息泄露溯源技术规程
- 大一《计算机基础》期末测试题MB含答案
- 消化道早癌内镜治疗后化疗药物性黏膜炎防治方案
- 消化系统疾病人才培养方案
- 2025云南曲靖市陆良县发展投资集团有限公司招聘42人考试笔试参考题库附答案解析
- 2025芜湖市湾沚区国有资本建设投资有限公司及子公司第一批招聘12人笔试考试参考题库附答案解析
- 新疆招标从业资格证考试及答案解析
- 2025高三英语高考词汇必背3500词
- 技术项目开发团队管理规范文档
- 2025下半年北京市公安局昌平分局勤务辅警招聘24人笔试考试参考题库附答案解析
- 医学检验科SOP文件全集
- 网络安全员考试实操题库及答案解析
- 2025 年大学动物医学(动物寄生虫)下学期期末测试卷
- 雨课堂在线学堂《军事理论》作业单元考核答案
- 员工离职流程及薪资结算标准
评论
0/150
提交评论