Academic journal article Canadian Social Science

Shallow Talk about Information Security in the Corporate Office

Academic journal article Canadian Social Science

Shallow Talk about Information Security in the Corporate Office

Article excerpt

Abstract

Information security refers to the information network hardware, software and its system of data protection, not subject to destroyed, changed or leaked by accidental or malicious reasons. System can be running continuously, reliably and normally. Information services can't be interrupted. The confidentiality, authenticity, integrity, unauthorized copying and its parasitic system security of the information is ensured. Information security in the Corporate Office is the key of enterprise modern office. Once be neglected, it is easy to bring a series of negative impacts. In this paper, the information security in enterprises office is to be discussed briefly.

Key words: Information; Security; Threats; Strategy

INTRODUCTION

For too long,information security has been considere daseparate discipline, is olated from the enterprise architecture. With the continuous development of computer science and network technology, information security has been a quite important problem. Network information security is a dynamic, the overall project. How to ensure network and information security has become a concern of the whole society. Information security problems are directly related to the informatization construction of Enterprises. The enhanced functions of the information utilities, the sustained accumulation of information resources lead the information security to be part of the safeguard of the corporations. Information security risk assessment is the foundation and the precondition of information security of organization, and is one of the front subjects in information security field.

Information as a kind of enterprise resources, its universality, sharing, Increment, handlability and Multiple utility, make it has special and important significance for enterprise production. For Liaohe oilfield Branch Company, up to now, with the rapid increase of the amounts of information in various aspects, it requires large capacity, high efficiency to transmit the information. In order to adapt to this situation, the development of information technology application makes a lot.

Information security in the Corporate Office is the key of enterprise modern office. Once be neglected it is easy to bring a series of negative impacts. In this article, we have summarized the concept and styles of cyber information security and the technique about firewall, data encryption and so on. The dissertation bases on what the author actually works for, the information security technologies and situation researched in current network, and the main content proposed. This paper takes an application example, to provide organization the best practice of information security risk evaluation.

1. THE THREATS OF INFORMATION SECURITY IN THE CORPORATE OFFICE

Corporate office information system is based on corporate firewalls, server, access the web, E-mail, company internal network, office PC hardware, database, Internet technology and the corresponding auxiliary equipment. It is a comprehensive management system. From the point of security situation, there is serious security threat in the enterprise office information system. Equipment provides the convenient information and resource sharing, but at the same time in security is fragile and complicated, pose a threat to data security and confidentiality. Potential security threats mainly have the following several aspects:

(1) Information disclosure: the information is disclosed or disclosed to unauthorized entities.

(2) Destroy the integrity of information: data is not authorized to add or delete from loss, modification or destruction.

(3) Denial of service: the resources of information or other lawful access was blocked unconditionally.

(4) Unauthorized access: some resource be used by any unauthorized person or ways.

(5) Hacking: stealing the information in the system resources and sensitive information by any possible legal or illegal ways. …

Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.