1, to ensure that large-scale information system failure and shutdown accidents do not occur.
2, to ensure that no vicious information leakage accident.
3. Ensure that malicious tampering accidents do not occur on information extranet websites.
Threats to information security in the network environment include:
1. impersonation: it refers to the act of illegal users entering information such as account numbers, invading the system and impersonating legitimate users, thus stealing information;
2. Identity theft: refers to the interception of legal users by other illegal users in the normal communication process; ?
3. Data theft: refers to illegal users intercepting data of communication networks;
4. Denial: It means that the communicator does not admit that he participated in an activity after attending it; ?
5. Denial of service: refers to the refusal or delay of service when legal users file legal applications;
6. Wrong route; ?
7. Unauthorized visits.
Measures to improve the ability of information security prevention
Strengthen the construction of network security infrastructure, promote the construction of network security situation awareness and emergency response platform, enhance the ability of network security situation awareness, and build an emergency command system with unified command, sensitive response, orderly coordination and efficient operation. Strengthen the construction of network security experts and technical support teams that combine specialization and socialization.
Implement the national science and technology and industrial policies, study and formulate policies and measures to adapt to the new characteristics of information technology industry development under the new situation, guide the research and development of network security core technologies and achievements transformation of enterprises such as An Tian, Anxin and Chengxin, support scientific research institutions and enterprises to actively undertake the research and development of major national information technology core technologies, and promote the rapid development of network information technology industry with "great wisdom going to the cloud" as the core.