What are the characteristic requirements of network security?
In the literature of American national information infrastructure, five attributes of security are clearly given: confidentiality, integrity, availability, controllability and non-repudiation. These five attributes are applicable to education, entertainment, medical care, transportation, national security, power supply, communication and other fields of national information infrastructure.
1. Confidentiality: the feature that information is not disclosed or used by unauthorized users, entities or processes.
2. Integrity: The characteristics of data cannot be changed without authorization. In other words, information remains unchanged during storage or transmission, and is not destroyed or lost.
3. Availability: refers to the expected ability to use information or resources, that is, the characteristics of authorized entities or users to access and use information as required.
4. Controllability: refers to people's ability to control the transmission path, scope and content of information, that is, bad content is not allowed to spread through public networks, so that information is under the effective control of legitimate users.
5. Undeniability: In the process of information exchange, we are convinced of the true identity of the participants, that is, all participants can't deny and deny the completed operations and commitments.
Legal basis:
people's republic of china network security law
Article 69
If a network operator violates the provisions of this law and commits one of the following acts, the relevant competent department shall order it to make corrections; Refuses to correct or if the circumstances are serious, a fine of not less than 50,000 yuan but not more than 500,000 yuan shall be imposed, and a fine of not less than 10,000 yuan but not more than 100,000 yuan shall be imposed on the directly responsible person in charge and other directly responsible personnel:
(1) Failing to take disposal measures such as stopping transmission and eliminating information prohibited by laws and administrative regulations in accordance with the requirements of relevant departments;
(two) refusing or obstructing the relevant departments to carry out supervision and inspection according to law;
(3) refusing to provide technical support and assistance to public security organs and state security organs.