Обмен на информация

Преглед

Informationexchangereferstotheprocessofdatainteractionbetweendifferentinformationentities.Itsgoalistorealizedatasharinginaheterogeneousenvironment,therebyeffectivelyusingresources.Improvetheperformanceoftheentireinformationsystem,speedupdatacirculationbetweeninformationsystems,andrealizedataintegrationandsharing.Itisatheoreticalbasisforunderstandinganddevelopinginformationexchangebetweenheterogeneousdatasources,anditisalsoapowerfultoolforsolvinginformationislands.Inadistributednetworkenvironment,informationexchangeispresentedtoheterogeneoussystemsinaunifiedexchangestandardfordataindifferentlocations,platformsandformatsfordataexchangeandsystemintegration.

Функция за обмен на информация

Themainstreaminformationexchangesystemismainlycomposedofinformationexchangecenterandbusinesssideinformationexchangecomponents,anditsfunctionsareroughlyasfollows:

Informationexchangecenter:Theinformationexchangecenterreceivesthemessagesentfromtheclientandforwardsitthroughitsinformationexchangecenterserverorextractsthedatathatneedstobesentfromthebusiness-sideapplicationdatabase,andsavesittotheshareddatabase.Amongthem,theshareddatabaseisthecoreoftheinformationplatformoftheinformationsharingandexchangesystem.Itstorestheinformationreleasedbyeachunitandthedataexchangedfromotherunits.Theestablishmentoftheshareddatabasealsohasthefunctionofprotectingtheindependenceandsecurityofeachclientapplicationsystem.

Businesssideinformationexchangecomponents:Ifacustomerneedstoconnecthisbusinessapplicationsystemtoaunifiedinformationsharingandexchangesystem,heonlyneedstoinstalltheapplicationbusinesssidecomponentsoftheunifiedinformationexchangesystem.Withouttheneedtomodifyitsbusinessapplicationsystem,itcanrealizeinformationexchangewiththeunifiedinformationsharingandexchangecenter.Themainfunctionoftheplug-inisthemutualconversionbetweenthedataintherespectivebusinesssystemsandtheunifiedstandarddata,interactwiththeinformationexchangecenterserver,andsendandreceivedata.

Кодиране на китайски знаци

Inviewoftheimportanceofinformationexchangeandthecodingstandardofunifiedtextsymbols,computersofdifferentbrandsandmodelscanusethesamesetofstandardizedinformationexchangecodes,soTheAmericanNationalBureauofStandardshasspeciallyformulatedtheASCIIcode(AmericaStandardCodeforInformationInterchange)asthestandardcodefordatatransmission.Intheearlydays,7bitswereusedtorepresentEnglishletters,numbers0-9andothersymbols,while8bitswereusedtorepresentatotalof256differentcharactersandsymbols.ThisisthemostcommonandwidelyusedEnglishstandardcodeinvariouscomputersystems.ComparedwithASCIIcode,themostwidelyusedinternalcodeinChinesesystemisBig-5code.

ASCIIcodeisthemostwidelyusedstandardcodeusedbymosttypesofcomputers.Inaddition,theuniversalcode(UNICODE)developedbyseveralwell-knownsoftwareandhardwaremanufacturersisanewstandardfordatarepresentation.UNICODEuses2or4bytestorepresenteachsymbol,whichcanrepresent65536or16.77millioncharactersintotal.,InadditiontoEnglish,itcanalsocontainthelargestnumberofChinese,Japanese,andtextsymbolsfromallovertheworld,makingtheexchangeofinformationevenmoreborderless.

Изисквания за сигурност за обмен на информация

Sincetheinformationexchangesystemismainlyalargenetworksystemplatformforinformationintegration,informationexchangeandsharingbetweenenterprisesinvariousindustries,itmayalsobealargenetworksystem.Alargecollectionofinsecurityfactors,especiallythecurrentnetworksecuritythreatsarebecomingmoreandmoreserious.Inthecurrentnetworksecurityenvironment,andbecausetheinformationexchangedintheinformationexchangesystemismainlyinternalinformationwithintheindustryorbetweenenterprisesanddepartments,thisinformationmaybesensitive,important,orevenItmaybeatradesecretrelatedtovitalinterests.Therefore,wedonotwanttheoutsideoritscompetitorstoknow,butitmustbeabletoensurethatnormalandlegitimateuserswithintheindustry,withintheenterpriseallianceandwithintheenterprisecanlearnaboutsharing,communicating,sending,andreceivinginformationinatimelymanner.Inadditiontoguaranteeingnormalbusinessfunctions,theinformationexchangesystemalsohastodointermsofsecurity:(1)Identityauthentication:onlythoseauthorizedandlegitimateusershavetherighttoaccesssystemresources,andTheuniquenessoftheuser'sidentitycanpreventdenialintheinformationexchangeprocess,andatthesametimedenyusersoutsidethesystemandpreventillegalusersfrompretendingtobelegitimateusersbyillegalmeanstodeceivethesystemtoachievesomegoals.Therefore,onlyafterthelegitimacyoftheuser'sidentityisconfirmedcaninformationexchangebecarriedout.Itcanbesaidthatidentityauthenticationisthesecurityfoundationoftheinformationexchangesystem.

(2)Permissioncontrol:Whenusersusethesystem,theirpermissionsmustbedeterminedandcontrolled.Accordingtodifferentlevelsofpermissions,usershavedifferentaccessandusesystemresourcesandservicestopreventusersfromaccidentallyorDeliberatelyoccupyandusesystemresourcesbeyondauthoritytoprotecttherightsofusersandthesecurityofinformation.Themainfunctionaldivisionsaretherighttosendinformation,therighttoreceiveinformation,andtherighttosourceandsinkinformation:

Sendinformationright.Ithasthefunctionsofacquiringlocaldataandsendinginformation.Usersofdifferentlevelsalsohavethefunctionsofdataencryption,datasignatureordigitalsignaturewhensendinginformation.Differentfunctions,suchasthequantity,type,numberoftargets,andthegranularityofencryptionEtc.;

Recipientauthority.Ithasthefunctionofreceivinginformation.Similarly,whenreceivingdata,theauthorityisdifferent,andthenumberandtypeofinformationthatthereceivingusercanreceivearealsodifferent;

Theauthorityofthesourceandsinkoftheinformation.Thedestination(receiver)oftheinformationsentandwhetheritcanaccepttheinformationfromthesource(sender)istoresolvethe"who"and"who"senttoreceive,controltheflowofinformation,andpreventthebroadcastanddisclosureofinformation.

Therefore,ensuringthesecurityofpermissionscanalsobesaidtoprotecttherightsofusers.

(3)Informationsecurity:ThetwoprocesseswheretheinformationissenttotheinformationexchangecenterandtheinformationexchangecenterisforwardedtothereceivingendarebothcarriedoutinthenetworktoensurethattheinformationinthesetwoprocessesisnotInformationsecurityissuessuchasstealing,tampering,counterfeiting,anddenialinsendingandreceivingaremainlyachievedthroughencryptionandsignatures.

(4)Secureinformationexchangecenter:becauseinformationismainlypassedthroughthiscenterAlargeamountofdataisstoredintheshareddatabasewhilebeingforwardedandaccessed.Therefore,thesecurityoftheinformationexchangecenteristhesecurityofthecenteroftheinformationexchangesystem.

(5)Securitymanagementofthekey:Thesecurityofthekeyisdirectlyrelatedtotheinformationsecurityintheexchange.

(6)Secureinformationtransmissionchannel:Althoughinformationtransmissioniscarriedoutinanopennetwork,networksecuritytechnologycanstillbeusedtostrengthentheSSLprotocol.

(7)Securitymanagement:Standardizedsecuritymanagementandraisingawarenessofnetworksecuritycanreducetheoccurrenceofsomesecurityincidents.Accordingtothe2008NationalInformationNetworkSecuritySituationandComputerVirusEpidemicInvestigationReportoftheMinistryofPublicSecurity,amongmorethan12,000informationnetworkusersandcomputerusers,theproportionofinformationnetworksecurityincidentsis62.7%;theproportionofmultiplenetworksecurityincidentsatthesametimeis50%,theproportionofmultipleinfectionsis66.8%;thecomputervirusinfectionrateis85.5%,indicatingthattheInternetusersinmycountryarestillrelativelyweakinnetworksecurityawarenessandnotpayingenoughattentiontotheoccurrenceofnetworksecurityincidents.Amongthem,theproportionofattacksorvirustransmissionfrominternalpersonnelincreasedby21%year-on-year,indicatingthattheinternalnetworksecuritymanagementoftheunitisnotyetinplace.

Related Articles
TOP