High entry review your notes (d)

1.6 Information Systems Security Technology

1.6.1 the concept of information security

(1) Content: privacy (Confidentiality), integrity (Integrity), availability (Availability)

(2) divided into levels: security equipment, data security, content security, safety behavior

(3) security level:

1) The first stage: damage to the citizens, legal persons and other organizations of the legality of equity, but does not harm national security, social order and the public interest

2) The second stage: damage to social order and the public interest without compromising national security

3) Third level: social order and the public interest would cause serious damage, or damage to national security

4) The fourth stage: causing serious damage to national security

5) Fifth grade: special cause serious damage to national security

(4) the degree of protection: user self-protection level, system-level audit protection, safety mark protection level, structural level of protection, access validation protection level

1.6.2 encryption, decryption and commonly used algorithms

The basic idea is that encryption disguise information, so that unauthorized persons can not understand its true meaning.

Plaintext - M

Ciphertext - C

Encrypted (plaintext -> ciphertext) Encryption

Decrypting (ciphertext -> plaintext) Decryption

Encryption Algorithm:

(1) symmetric cryptography: encryption and decryption of the same secret key

DES: 56 bit Data Encryption Standard (simple and quick, short keys, and difficult to decipher)

3DES: 112 bit

IDEA: 128 digit International Data Encryption Algorithm

AES: 256-bit data encryption standard algorithm

(2) asymmetric cryptography: encryption and decryption of different keys, encryption keys can be made public, confidential decryption key

RSA: any length, 512, both for encryption, digital signature but also for

Hash functions: to provide confidentiality, message authentication, and digital signatures

Digital Signature: a proof of the identity of the parties information and data authenticity

(3) Certification: ensure the authenticity and integrity, prevent the opponent the initiative to attack, such as pretending, tampering, replay and so on;

Encryption: To ensure confidentiality, prevent the opponent's passive attacks, such as interception, theft and so on;

1.6.3 Information Systems Security

Firewall: blocking delivery of network data from unauthorized access and insecurity, making the local system and network from Internet security threats by many, mainly for external network and logical isolation protected internal network (static safety technology)

Intrusion Detection and Prevention:

(1) Intrusion Detection System (IDS): focus on the regulatory status of network security (passive)

(2) Intrusion Prevention System (IPS): emphasis on the control of the intrusion (active)

Common wireless network technologies include: WPKI, WEP, WPA / WPA2, WAPI, 802.11i, etc.

Operating system security threats division: cut, interception, tampering, forgery

1.7 Information Development and Application

New Features 1.7.1 Information Development and application of

1.7.2 National Development Strategy

Formulas: by Jung community-based open competition with security

  • Promote the economic information
  • Promoting e-government
  • Building an advanced network culture
  • Promote the information society
  • Improve the comprehensive information infrastructure
  • Strengthen the development and utilization of information resources
  • Improve the competitiveness of the information industry
  • Building national information security system
  • Application of information technology to improve the national capacity

1.7.3 E-government

E-government application mode:

(1) G2G: Government to Government

(2) G2B: Government enterprises

(3) G2C: Government to the public

(4) G2E: Government civil servants

1.7.4 E-commerce

E-commerce Application Type:

(1) B2B: Business to Business

(2) B2C: Business to Consumer

(3) C2C: Consumer to Consumer

(4) B2A (B2G): business-to-government

(5) O2O: for online and offline

1.7.5 Industry and Information Fusion

1.7.6 Wisdom

1.8 Information Management System Services

1.8.1 Information services and systems development

Chinese characteristics, information systems integration and service management system:

(1) Information systems integration, operation and maintenance services and the supervision and management information systems;

(2) project management, evaluation of the level of operation and maintenance services and information systems of supervisors;

(3) the State Planning Organization of the norms of corporate information systems and personnel with project management capabilities of recommended requirements;

(4) specification of information system users, with information systems project management capabilities of enterprises and personnel market demand.

1.8.2 The concept and development of information systems engineering supervision

Project supervision: Four control three a coordination

(1) Four control: investment control, schedule control, quality control, change control

(2) three: contract management, information management, security management

(3) a coordination: communication and coordination

1.8.3 Information system operation and maintenance of the concept and development

Operation and maintenance of the information system life cycle is the most important and longest stage.

1.8.4 standard and framework for IT Service Management

Standardized guidelines for the management of information resources: benefit principle, system principle, dynamic principle, the principle of optimization, negotiation principles.

Business process is divided into: management processes, operational processes, support processes

Guess you like

Origin www.cnblogs.com/AnotherBlue/p/11887110.html