信息安全英文文献

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

Procedia-SocialandBehavioralSciences,2014,Vol.45,pp.178-184StudyonSecurityStrategiesforInformationSystemsandInformationManagementRosenblad-WallinEDepartmentofConsumerTechnology,ChalmersUniversityofTechnology,Göteborg,Sweden.AbstractThisarticledescribesthecharacteristicsandstructureofinformationsystems,analyzesthesecurityofinformationsystems.Bysecurityconsiderationsofinformationsystems,securityrisks,securitymechanismstobuildsecureinformationsystemsderivedmeasures,andithasgreatpracticalsignificance.Keywords:informationsystems;informationmanagement;securityPolicy1InformationsystemInformationsystemsisaverycomplexsystemofmoderninformationresourcenetworkcomputersystemsandcommunicationssystemsisbased.Amongthem,thecomputeristhecoreofinformationsystems,softwareandhardwarecomponents,usedtocompletetheautomatedprocessingofinformation;communicationsystemconsistsofaworkstation,computernetworksandcommunicationnetworksconstitutedbyacomputerorbetweenthelineandthroughthelineandterminalequipmentbetweendatatransmission.Combinedwithcomputersystemsandcommunicationsystems,sothattheinformationtransmissionwithdynamic,randomandtransientcharacteristicssuchastheoccurrenceandtreatmentacrossgeographicbarrierstoachieveaglobalinterconnection.9majorfeatureisthesystemopeninformationsystems,resourcesharing,mediastoragedensity,dataexchangevisits,informationgatherbynatureconfidentialdifficulty,mediumremanenceeffect,electromagneticleakageresistance,communicationnetworksandothervulnerabilities.Obviously,thesecharacteristicsarecloselyrelatedtothesecurityofinformationsystems,determinestheinsecurityofinformationsystems.Thesecharacteristicsofitsinformationsystemssecurityposesapotentialdangerifthesecharacteristicsareutilized,systemresourceswillbeagreatlossto,orevenrelatedtotheorganizationofimportantsecrets.Therefore,strengthenthemanagementofinformationsystemshavegreatpracticalsignificance.2InformationSystemArchitectureInformationsystemisacomplextechnicalsystem,fromastructuralpointofviewdescriptionshouldincludeinfrastructure,architectureandbasicfunctionsofthreeparts,asshowninFig.1.Procedia-SocialandBehavioralSciences,2014,Vol.45,pp.178-184Fig.1InformationSystemArchitecture3ThesecurityofinformationsystemsInformationSystemsSecuritySecurityofinformationsystemsreferstopreventrunaccidentorvandalismofinformationsystems,ortheillegaluseofinformationresources,informationsystemssecuritymeasurestaken.Factorsassociatedwiththeinformationsystemsecuritymainlyinthefollowingsevenkinds:a.Naturalandirresistiblefactors:mainlyhazardsoffire,electricity,water,staticelectricity,dust,harmfulgases,earthquakes,lightning,strongmagneticfields,electromagneticpulsesandsocialviolenceorwar,etc.,someofthesehazardscandamagethesystemequipment,Thedatawillbedestroyed,andevendestroytheentiresystemanddata.Thesefactorswilldirectlyendangerthesecurityofinformationsystemsentities.b.Thehardwareandphysicalfactors:Referstoasecureenvironmentandareliablesystemhardware,includingsecurityroomfacilities,computermainbody,thestoragesystem,auxiliaryequipment,datacommunicationfacilities,andinformationstoragemedium.c.Electromagneticfactors:thecomputersystemanditscontrolofinformationanddatatransmissionchannel,inthecourseoftheirworkwillproduceelectromagneticradiation,inacertaingeographicrangeiseasilydetectedandreceivedbyaradioreceiver,whichmayresultininformationviaelectromagneticradiationleaks.Inaddition,thespaceelectromagneticsystemmayproduceelectromagneticinterference,affectingthenormaloperationofthesystem.d.Softwarefactors:illegaldeletion,duplicationandtheftsoftwarewillmakethesystemaloss,andmaycauseleaks.Computervirusisasoftwarenetworkintrusionsystemsasameansofdestruction.e.Datafactors:referstothedatainthestorageandtransmissionofinformationintheprocessofsecurity,whichisthemaincoreofcomputercrime,thatmustbethefocusofsecurityandconfidentiality.f.Humanandmanagementfactors:thequalityofthestaffinvolved,responsibility,andstrictadministrativesystemsandlawsandregulationstoprotectagainstthethreatofman-madefactorsProcedia-SocialandBehavioralSciences,2014,Vol.45,pp.178-184activesafetysystemsdirectlycaused.g.Otherfactors:referstosystemsecurityifthereareproblems,canminimizetheloss,theimpactislimitedtotheextentpermitted,toensurerapidandeffectiverecoveryofallfactorsthatthesystemisrunning.ThemainsafetyhazardsSystemsecurityrisksininformationsystemsfrequentlyoccurarethefollowing:a.Dataentryproblems:datainputdevicesintothesystem,theinputdataisvulnerabletotamperingoradulteration;b.Dataprocessingproblems:dataprocessingpartofthehardwarecaneasilybedestroyedortheft,andsusceptibletoelectromagneticinterferenceorbecauseofinformationleakagecausedbyelectromagneticradiation;c.Communicationlinesrisks:informationandcommunicationlinescaneasilybeinterceptedonthelinecaneasilybedestroyedortheft;d.Softwaresystemproblems:operatingsystems,databasesystemsandapplicationssoftwareandtheintegrityoftherelevantinformation,specificallyincludingsoftwaredevelopmentdisciplines,softwaresecuritytesting,softwaremodificationandreplication;e.Outputsystemproblem

1 / 7
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功