In the enterprise management information system has many business documents in circulation, which is certainly of importance file , and some even to the future development of enterprises involved , if such information is transmitted over the network in general by competitors or criminals wiretapping, leaks , tampering or forgery , it will seriously threaten the development of enterprises , so that SMEs electronic information security technology research has important significance.
在公司的管理信息系统中有很多的公司文件在流转,那里面肯定有关紧性文件,有的甚至于牵涉到到公司的进展前景,假如这些个信息在通用过网络传递时被竞争对手或不合法分子窃听、泄露机密、窜改或假造,将会严关紧挟公司的进展,所以,中小公司电子信息安全技术的研讨具备关紧意义。
Significance of information technology for SMEs
中小企业的信息化建设意义
In this Information Age , the company's continuous development process of information , information has become the key to success , but also an important way to improve the management level . Today the enterprise business activities, basically using the form of e-commerce , enterprise's production operations , transport and sale of all aspects of information technology applied to . Such as through the network to collect some information about the quality of raw materials , price, place of origin and other information to create a raw material information system, the information system for procurement of raw materials has a significant role . Through analysis of the data can be obtained with the number of procurement proposals and countermeasures, electronic information enterprise level . The survey shows that Eighty-two percent of SMEs in the site should also promote corporate image , publishing products and services , to collect customer information at this stage , while e-commerce transactions related to the application of this less than a quarter one , indicating that companies have not yet fully develop and utilize information on commercial channels . SMEs in the information age has come, enterprises should speed up the construction of information .
在这个网络信息时期,公司的信息化进程项不断进展,信息成了公司胜败的关键,也是管理水准增长的关紧路径。现在公司的商业上的事务活动,基本上都认为合适而使用电子商业上的事务的方式施行,公司的出产运作、运送和销行多种方面都使用到达信息化技术。如经过网络使聚在一起一点关于原材料的品质,价钱,生产地等信息来树立一个原材料信息系统,这个信息系统对原材料的采集购买有非常大的效用。
Electronic information security technology explained
The encryption of electronic information technology
Encryption technology enables data transfer more secure and integrity , encryption technology is divided into two kinds of symmetric and asymmetric encryption . Usually through the sequence in which a symmetric encryption password or grouping to achieve confidentiality , including clear text , key, encryption algorithms and decryption algorithms such as five basic components . Symmetric encryption and asymmetric encryption are different , asymmetric encryption requires a public key and a private key two keys , a public key and private key must be paired with a public key encryption , only the corresponding private key can decrypt . Encrypted with the private key , and only with the corresponding public key can decrypt it.
Encryption of electronic information transmitted can play the role of secrecy . Sending the electronic message, the sender using the encryption key or algorithm to encrypt the information sent after its issue , if someone steals the information during transmission , he can get the ciphertext , the ciphertext can not be understood . Accept the decryption key can decrypt the ciphertext to restore the plaintext .
Authentication technology
Message authentication and authentication are two forms of authentication technology , message authentication is mainly used to ensure the integrity and anti- repudiation , user authentication via message to confirm whether the information is true and modified or falsified by a third party . Authentication and authentication using the user's identity , including the identification and validation in two steps. Clearly identify and distinguish the identity of visitors to confirm identity of visitors called authentication. Users access to some non-public resources must pass authentication. Such as access to university check subsystems , it must be through the Student ID and password authentication to access . Some university library resources in order to access the campus network , campus network can not enter non- unless the request and pay for a qualified access status.
SMEs in the main security elements of electronic information
Confidentiality of information
In today's Internet age, the confidentiality of information work seems to become less easy, but the information directly represents the company 's trade secrets, how to protect corporate information from being stolen , tampered with, abuse and destruction, how to use the Internet for information transmission and to ensure information security has become the important issues that must be addressed for SMEs .
Validity of the information
With the development of electronic information technology , small and medium enterprises have made use of the transmission of information in electronic form , the validity of information directly related to the economic interests of enterprises , but also a corporate business smoothly prerequisite. So to eliminate all kinds of network failures, hardware failures, network failures of these potential threats to the control and prevention , ensuring the integrity of information
Corporate parties to the transaction counterparty business strategy severely affect the integrity of the information , so the parties to the transaction to maintain the integrity of information is very important for the parties to the transaction are very important . In the information processing of the information to prevent random generate, modify , during transmission to prevent loss of information , maintaining the integrity of information is the basis for transactions between enterprises .
Solve the problem of SMEs in electronic information security strategy
Build electronic information security management system for SMEs
Solving information security problems in addition to using security technologies , it also should establish a comprehensive electronic information security management system to ensure the smooth progress of information security management . In general, small and medium enterprises , the initial establishment of the relevant information management system is largely restricts an information system security. If the safety management system is a problem, then around this system to select and use technology and security management tools will not work correctly , information security can not be guaranteed . Perfect, strict information security management system for electronic information system security greatly. In the enterprise information system, if not strictly comprehensive information security management system , electronic information security technology and related security tools it is impossible to play its due role .
Use of corporate network conditions to provide information security services
Many enterprises have multiple two units within the system through the WAN is China Unicom , LAN in each unit are completed, the companies should take advantage of this favorable network conditions to provide enterprises with good information security services. Through this network platform release enterprise technical standards, security bulletins and safety regulations , providing information security software downloads, security equipment selection, providing online information security education and training , as well as employees to provide a place to exchange experiences .
Regular security assessment software system to improve
With the development of enterprises, enterprise information technology applications and information technology development, people 's awareness of information security issues , with the development of technology and continuous improvement of electronic information security issues continue to be discovered at the same time , solve the information security issue security software system should continue to improve , on a regular basis to evaluate the system .
In short, each SME electronic security technology galaxy contains technical and managerial , and institutional factors such as information technology continues to evolve , not only gradually moving towards office automation office SMEs , but also to ensure the security of electronic information enterprises .
|