Current location - Loan Platform Complete Network - Big data management - What are the two elements of the database system access security rights?
What are the two elements of the database system access security rights?
What is the content and development trend of information systems security management I. Information systems security management content Through the previous chapters of the study, we know that the information system is mainly composed of three elements, namely: people, information and information technology. Then the security management of information systems is no more than the management of these three elements and the coordination of the relationship between the three. People are the dominant information system security management, management of the object to be viewed from two perspectives, from the point of view of information is the security of the information itself, we want to prevent the loss of information and from destruction; from the point of view of technology is the security of the entire system, we want to prevent the paralysis of the system and from destruction. And in today's information and digital age, mankind through the information system to obtain wealth and benefits at the same time, but also face the threats brought by the information system. Information systems often face security threats: (These threats are small enough to interfere with the normal operation of information systems, or bring economic losses, and large enough to pose a threat to the security of a country) 1, unauthorized use, copying and distribution of computer software. (In the world, software companies suffer losses of tens of billions of dollars a year due to piracy and illegal copying, most of which are in developing countries, our country is particularly prominent) 2, unauthorized employees from the corporate database to search or copy the information. (The so-called home invasion, employees may have different purposes, some for money, some for revenge, some for favors, etc., no matter what the purpose, will bring direct or indirect losses to the unit) 3, viruses, Trojan horse program dissemination, the information system damage (we modern people every day to contact a large amount of information, some of the viruses and hackers will be mixed with them, a little careless, the data will be damaged, or even a little bit. data will be damaged, or even system paralysis. And are the first to have a new virus appeared, after the adverse effects, there will be for its antivirus software, as if the contradiction of the fight, the first sharp spear and only after the tough shield, so the prevention of viruses is a long-term arduous task) 4, illegal invasion of the computer system, stealing passwords, information or sabotage of man-made or other reasons for the loss of the system data, disgruntled employees or partners of the malicious destruction (). May Day holiday before the North Post home page is not hacked, hackers also QQ to stay on it, the impact on our school is very bad, look at our school's network security, and then look at the Internet Internet speed, but also claimed to be the field of communications Huangpu it) 5, due to construction or equipment maintenance and maintenance is not appropriate or other reasons lead to the information system is paralyzed (for example, the construction of digging up the fiber optic cables; routers, switches, and other network equipment caused by improper maintenance of the network) (paralyzed) For the security threats facing the information system, we are still in the management of prevention, the main elements of management should include: 1, the establishment of a strict management system and operating procedures, both in the construction of the information system, application and management, there should be a set of scientific standards (lessons learned from the construction of lightning protection system) 2, often back up the data, the off-site storage of data (911 case) Often back up the data, the Can be in your information system data suffered damage, rapid recovery system, so that the loss of the lowest; off-site storage of data, you can make the information system in the event of a devastating blow, you can still preserve the data. U.S. 911 that unprecedented disaster, the World Trade Center was flattened, many companies' information systems were completely destroyed, including storage media used to back up data, but in fact, 95% of these companies in the disaster soon after the information system to rebuild, thanks to the off-site storage of data, equipment is gone can be re-bought, the data is gone, there is no way to rebuild in the short term, the need for a few years or even a dozen years of Accumulation, should be an old Chinese saying, stay in the green hills, not afraid of no firewood. 3, the application of anti-virus software and firewall technology antivirus software is mainly used to prevent viruses, firewall software is used to prevent hacker attacks. Although you can not make your information system is absolutely safe, but it is the protection of information security is an indispensable barrier. 4, the identity of information system users to confirm the identity of the identity is used to determine the certain identity of the actuality, such as the user, network hosts, files or data identification, confirmation of the identity of the system can be based on the identity of a different identity to give different rights. There are three main methods to achieve authentication: 1, password; its application is more widespread, but also has the disadvantage that it is relatively low security (database password). 2, the possession of an object, (magnetic cards, such as bus cards, water cards, meal cards) 3, features (voice, fingerprints, iris) 5, file encryption technology (the principle of encryption) 6, the security of the process of transmission of information (as small as personal privacy, the company's information security, to the national security) we often use to determine the identity of a certain identity is true, such as network hosts, files or data recognition, confirmation of identity before the system can give different rights according to different identities. (Large to national security) We often say a phrase called the wall has ears, that is to say, when two people are talking, the information exchanged by the third party access, this time is not caused by leakage? When you make a phone call, someone puts the phone line on your phone line, the content of your call will also be eavesdropped, this is at the personal level, and then look at the country between, 91 years during the Gulf War, the United States rely on military satellites, reconnaissance planes and listening stations located in Saudi Arabia, a large number of intercepted Iraqi military intelligence, Iraqi forces, every move completely in the grasp of the United States, and finally, the Iraqi army 700,000 elite **** and national guard left less than 300,000 people and the National Guard left less than 300,000 people. We know that the metal wire in the electric current through, will produce a magnetic field, the strength of the magnetic field with the strength of the current and change, advanced listening devices can collect these electromagnetic signals, analysis, so as to obtain useful information, it is because of this, our country in the mid-to-late nineties, painfully determined to build a seven horizontal and eight vertical fifteen military fiber-optic communications backbone to prevent the leakage of military intelligence, 2000 years later The American people listening to China's military communications became more and more difficult, and began to say that China's military is not transparent.

If this helps you, please remember to adopt it as a satisfactory answer, thank you! I wish you a happy life! vae.la