Home  >  Article  >  What does the operational security of computer information systems include?

What does the operational security of computer information systems include?

王林
王林Original
2020-12-02 13:53:5715306browse

The operational security of computer information systems includes four aspects: system risk management, audit tracking, backup and recovery, and emergency response. The operational security of the system is an important part of the security of computer information systems. Only when the security of the computer information system is guaranteed can the correct processing of information be completed.

What does the operational security of computer information systems include?

The operational security of computer information systems includes four aspects: system risk management, audit tracking, backup and recovery, and emergency response.

(Related recommendations: windows)

The operating security of the system is an important part of the security of the computer information system, because only the security during the operation of the computer information system can be guaranteed , in order to complete the correct processing of information and achieve the purpose of exerting various functions of the system

Computer information system refers to a system composed of computers and their related and supporting equipment and facilities (including networks). According to certain A human-machine system that collects, processes, stores, transmits, and retrieves information based on its application goals and rules, that is, information management and information systems.

Risk analysis refers to the step of potential losses caused by the possibility of threats occurring and the vulnerability of the system to attack. It is the basis of the risk management program. Its ultimate purpose is to help select security protection and reduce risks. reduced to an acceptable level. Computer information systems need to be statically analyzed before design and operation, with the aim of discovering potential security risks of the system; secondly, dynamic analysis of the system is performed, that is, testing, tracking and recording its activities during the operation of the system, with the aim of discovering potential safety hazards of the system during operation. security vulnerabilities; the last is the analysis after the system is running, and the corresponding system vulnerability analysis report is provided.

The above is the detailed content of What does the operational security of computer information systems include?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn