Computer security usually includes the following attributes: availability, reliability, integrity, confidentiality, non-repudiation, controllability, auditability and other attributes. Computer security is to protect computer hardware, software, and data from being damaged, altered, or leaked due to accidental or malicious reasons.
The operating environment of this tutorial: Windows 7 system, Dell G3 computer.
Computer security usually includes the following attributes:
Availability, reliability, integrity, confidentiality, non-repudiation, controllability and auditability, etc.
Availability: means that authorized entities can access resources and receive services when needed.
Reliability: refers to the system completing the specified functions under specified conditions and within the specified time.
Integrity: It means that the information is not destroyed by accidental or deliberate deletion, modification, forgery, reordering, replaying, insertion, etc.
Confidentiality: refers to ensuring that information is not exposed to unauthorized entities.
Non-repudiation: It means that both communicating parties cannot deny the information they have received or sent, also known as non-repudiation.
Controllability: The ability to control the dissemination and content of information.
Auditability: It means that all security-related operations that occur in the system have descriptive records that can be checked.
The above attributes are the attributes that information security should have.
Extended information
For computer security, the explanation given by the International Committee for Standardization is: established and adopted for data processing systems Technical and management security protection to protect computer hardware, software, and data from being destroyed, altered, or leaked due to accidental or malicious reasons. The definition of the Computer Management and Supervision Department of the Ministry of Public Security of our country is: Computer security refers to the security of computer assets, that is, computer information system resources and information resources are not threatened and harmed by natural and man-made harmful factors.
Methods to improve computer security attributes:
(1) Computer management implements the principle of "whoever uses it is responsible". Take good care of the machine, understand and be familiar with its performance, and check or clean the computer and related peripherals in a timely manner.
(2) Master the general knowledge of work software, office software and network usage.
(3) There are no special work requirements. All work must be carried out on the intranet. The management and destruction of work content stored on storage media must comply with confidentiality requirements and strictly prevent leakage.
(4) Confidential information shall not be processed on external networks, the Internet, or intranets. Confidential information can only be operated on a separate computer.
(5) Any information related to computer user names, passwords, and hardware encryption must be kept confidential, and leakage is strictly prohibited, and password settings must be reasonable.
(6) Computers with wireless interconnection capabilities are not allowed to access the intranet, and are not allowed to operate or store confidential files or work secret files.
(7) Non-internal computers are not allowed to access the intranet.
For more computer-related knowledge, please visit the FAQ column!
The above is the detailed content of What are the attributes of computer security?. For more information, please follow other related articles on the PHP Chinese website!