Confidentiality: Ensure that only authorized personnel can read or modify the information stored or transmitted in the network or system.
Integrity: ensure that the information stored or transmitted in the network or system will not be maliciously tampered with or destroyed.
Availability: Ensure that users and system administrators can obtain the required services and resources within a reasonable time, and prevent attackers from making the network or system invalid or unavailable for a long time through attacks or other means.
Authentication: Ensure that the identity of the user or device is true, so as to provide appropriate services and authorize access.
Authorization: ensure that users or devices can only access the resources they need, and conduct detailed access control and authority management for each user or device.
Non-repudiation: the transaction information transmitted in the network or system is credible and undeniable.
Security: Ensure the security of networks, systems and applications. , and can detect and defend against possible attacks.
Privacy: Ensure that users' privacy is protected to avoid malicious acquisition and abuse of personal information.
In a word, network information security is a very complex and multifaceted field, including confidentiality, integrity, availability, identity authentication, authorized access, non-repudiation, security and privacy protection. All kinds of technical means and management methods are needed to ensure the security of network systems and data.