Information security is to protect the "availability", "confidentiality", "integrity", "controllability" and "auditability" of data. Information security is to protect computer hardware, software, and data from being damaged, altered, and leaked due to accidental and malicious reasons.
The operating environment of this tutorial: Windows 7 system, Dell G3 computer.
Information security, ISO (International Organization for Standardization) defines it as: the technical and managerial security protection established and adopted for data processing systems in order to protect computer hardware, software, and data from accidental and malicious destroyed, altered and leaked for any reason.
There are 5 criteria to measure whether information is safe:
(1) Integrity of information, ensuring that the information is not exposed to unauthorized users or processes, that is, the original data of the information cannot be illegally obtained or modified. , it is the basis for ensuring the reliability of information;
(2) Availability of information, authorized legal users or processes can access the corresponding authorized information data at any time as long as needed (even if there is an attacker, the attacker cannot Occupying all resources and hindering the work of the authorizer);
(3) Confidentiality of information, only authorized people can modify the data, and deny illegal access;
(4) The controllability of information can control the flow and behavior of information within the scope of authorization;
(5) The reviewability of information can provide the basis and means for investigating network security issues that arise. . These five metrics can only qualitatively measure network security.
Related expansion introduction:
The full name of the International Organization for Standardization (International Organization for standardization) and the abbreviation (ISO) are not exactly the same. In fact, "ISO" is an etymology derived from the Greek word meaning "equal."
From "equal" to "standard", the idea of using "ISO" as the name of the organization seems very logical. In addition, ISO is used as a name to represent the organization throughout the world, thus avoiding the different situations that arise when member groups use different national languages to convert "International Organization for Standardization" into acronyms. No matter which country it is in, The abbreviation of the organization has always been "ISO".
The purpose and purpose of the International Organization for Standardization is:
"To promote the development of standardization work worldwide to facilitate international material exchange and services, and to expand the scope of knowledge, science, technology and Economic cooperation." Its main activities are to formulate international standards, coordinate worldwide standardization work, organize members and technical committees to exchange information, cooperate with other international organizations, and jointly study related standardization issues.
Related recommendations: " Programming Learning Website"
The above is the detailed content of Information security protects data. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

Dreamweaver CS6
Visual web development tools

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.