1.6 Information Systems Security Technology
1.6.1 the concept of information security
(1) Content: privacy (Confidentiality), integrity (Integrity), availability (Availability)
(2) divided into levels: security equipment, data security, content security, safety behavior
(3) security level:
1) The first stage: damage to the citizens, legal persons and other organizations of the legality of equity, but does not harm national security, social order and the public interest
2) The second stage: damage to social order and the public interest without compromising national security
3) Third level: social order and the public interest would cause serious damage, or damage to national security
4) The fourth stage: causing serious damage to national security
5) Fifth grade: special cause serious damage to national security
(4) the degree of protection: user self-protection level, system-level audit protection, safety mark protection level, structural level of protection, access validation protection level
1.6.2 encryption, decryption and commonly used algorithms
The basic idea is that encryption disguise information, so that unauthorized persons can not understand its true meaning.
Plaintext - M
Ciphertext - C
Encrypted (plaintext -> ciphertext) Encryption
Decrypting (ciphertext -> plaintext) Decryption
Encryption Algorithm:
(1) symmetric cryptography: encryption and decryption of the same secret key
DES: 56 bit Data Encryption Standard (simple and quick, short keys, and difficult to decipher)
3DES: 112 bit
IDEA: 128 digit International Data Encryption Algorithm
AES: 256-bit data encryption standard algorithm
(2) asymmetric cryptography: encryption and decryption of different keys, encryption keys can be made public, confidential decryption key
RSA: any length, 512, both for encryption, digital signature but also for
Hash functions: to provide confidentiality, message authentication, and digital signatures
Digital Signature: a proof of the identity of the parties information and data authenticity
(3) Certification: ensure the authenticity and integrity, prevent the opponent the initiative to attack, such as pretending, tampering, replay and so on;
Encryption: To ensure confidentiality, prevent the opponent's passive attacks, such as interception, theft and so on;
1.6.3 Information Systems Security
Firewall: blocking delivery of network data from unauthorized access and insecurity, making the local system and network from Internet security threats by many, mainly for external network and logical isolation protected internal network (static safety technology)
Intrusion Detection and Prevention:
(1) Intrusion Detection System (IDS): focus on the regulatory status of network security (passive)
(2) Intrusion Prevention System (IPS): emphasis on the control of the intrusion (active)
Common wireless network technologies include: WPKI, WEP, WPA / WPA2, WAPI, 802.11i, etc.
Operating system security threats division: cut, interception, tampering, forgery
1.7 Information Development and Application
New Features 1.7.1 Information Development and application of
1.7.2 National Development Strategy
Formulas: by Jung community-based open competition with security
- Promote the economic information
- Promoting e-government
- Building an advanced network culture
- Promote the information society
- Improve the comprehensive information infrastructure
- Strengthen the development and utilization of information resources
- Improve the competitiveness of the information industry
- Building national information security system
- Application of information technology to improve the national capacity
1.7.3 E-government
E-government application mode:
(1) G2G: Government to Government
(2) G2B: Government enterprises
(3) G2C: Government to the public
(4) G2E: Government civil servants
1.7.4 E-commerce
E-commerce Application Type:
(1) B2B: Business to Business
(2) B2C: Business to Consumer
(3) C2C: Consumer to Consumer
(4) B2A (B2G): business-to-government
(5) O2O: for online and offline
1.7.5 Industry and Information Fusion
1.7.6 Wisdom
1.8 Information Management System Services
1.8.1 Information services and systems development
Chinese characteristics, information systems integration and service management system:
(1) Information systems integration, operation and maintenance services and the supervision and management information systems;
(2) project management, evaluation of the level of operation and maintenance services and information systems of supervisors;
(3) the State Planning Organization of the norms of corporate information systems and personnel with project management capabilities of recommended requirements;
(4) specification of information system users, with information systems project management capabilities of enterprises and personnel market demand.
1.8.2 The concept and development of information systems engineering supervision
Project supervision: Four control three a coordination
(1) Four control: investment control, schedule control, quality control, change control
(2) three: contract management, information management, security management
(3) a coordination: communication and coordination
1.8.3 Information system operation and maintenance of the concept and development
Operation and maintenance of the information system life cycle is the most important and longest stage.
1.8.4 standard and framework for IT Service Management
Standardized guidelines for the management of information resources: benefit principle, system principle, dynamic principle, the principle of optimization, negotiation principles.
Business process is divided into: management processes, operational processes, support processes