Network information classification

December. 21,2021
Network information classification

Network communication has the characteristics of joint operations throughout the entire network. As far as communication is concerned, it consists of five major parts: transmission and exchange, network standards, protocols and codes, communication terminals, communication sources, and personnel. These five major parts will be severely threatened and attacked, and they will all become points of attack on the network and information. In the network, ensuring information security is the core of network security. The information in the network can be divided into two categories: user information and network information.

User Info

In the network, user information mainly refers to user-oriented voice, data, image, text and various media library information, which roughly includes the following types:

General public information: such as normal mass media information, public propaganda information, mass entertainment information, advertising information and other public information.

Personal privacy information: If the private information is purely personal, the legitimate rights and interests of users should be protected.

Intellectual property protection information: such as the scope of protection stipulated in Article 2 of the "Convention Establishing the World Intellectual Property Organization" signed internationally, it shall be protected by relevant laws.

Commercial information: including e-commerce, e-finance, securities and taxation information. This kind of information contains a large amount of property and is an important target for criminals to attack. Necessary measures should be taken for safety precautions.

Bad information: It mainly includes bad information related to politics, culture, ethics and morality, as well as boring or useless information called "information junk". Certain measures should be taken to filter or eliminate such information, and criminals and criminal groups should be cracked down in accordance with the law. .

Offensive information: It involves a variety of man-made malicious attack information, such as "hacker" attacks at home and abroad, internal and external attacks, computer crimes and computer virus information. This kind of targeted attacks is very harmful to information, and security precautions should be emphasized.

Confidential information: In accordance with relevant national regulations, determine the different confidential levels of information, such as secret level, confidential level and top secret level. This kind of information involves secret information in politics, economy, military, culture, diplomacy, etc. It is the focus of information security, and effective measures must be taken to give special protection.

Internet Information

In the network, network information is different from user information. It is information oriented to the operation of the network. Network information is dedicated information inside the network. It only provides limited maintenance, control, detection and operation information to communication maintenance and management personnel, and its core parts are still not allowed to be accessed at will. In particular, it should be pointed out that the current threats and attacks on the network are not only to obtain important user confidential information and get the greatest benefit, but also to direct the attack on the network itself. In addition to attacks on network hardware, attacks on network information can also be carried out. In severe cases, the network can be paralyzed and even endanger national security. Network information mainly includes the following:

Communication program information: Due to the complexity of the program and the diversity of programming, and it often exists in a form that is not easy for people to understand, it is easy to reserve hidden defects, viruses, hidden channels and implant various attacks in the communication program. information.

Operating system information: In complex large-scale communication equipment, a specialized operating system is often used as an interface program module between its hardware and software applications. It is the core control software of the communication system. Due to the incomplete security of some operating systems, potential intrusions will be incurred, such as illegal access, confusion in access control, incomplete intermediaries, and operating system defects.

Database information: In the database, there are both sensitive data and non-sensitive data. It is necessary to consider both security and openness and resource sharing. Therefore, the security of the database must not only protect the confidentiality of the data, but it is important to ensure the integrity and availability of the data, that is, to protect the physical and logical integrity of the data and the integrity of the elements, and under any circumstances , Including after catastrophic accidents, can provide effective visits.

Communication protocol information: A protocol is a series of orderly steps taken by two or more communication participants (including persons, processes, or entities) to complete a certain function, so that the communication participants can coordinately complete communication links and realize interconnection Mutual agreement. The communication protocol has the characteristics of pre-design, mutual agreement, non-ambiguity and completeness. Many related protocols have been developed in various networks. For example, in confidential communication, only encrypting does not guarantee the confidentiality of the information. Only by encrypting correctly and ensuring the security of the protocol can the confidentiality of the information be realized. However, the incompleteness of the agreement will give attackers an opportunity and cause serious consequences.

Signaling information of telecommunication network: In the network, the destruction of signalling information can lead to a large-scale paralysis of the network. For the reliability and availability of the signaling network, the entire network should take necessary redundancy measures, as well as effective scheduling, management and reorganization measures to ensure the integrity of the signaling information and prevent man-made or non-man-made tampering and destruction. Prevent active attacks and virus attacks on signaling information.

Timing information of digital synchronization network: my country's digital synchronization network adopts a fully synchronized network controlled by a distributed multi-regional reference clock (LPR). The LPR system is composed of rubidium clocks plus two global positioning systems (GPS), or is composed of integrated timing supply system BITS plus GPS. In Beijing, Wuhan, and Lanzhou, a nationwide first-level standard clock (PRC) has been established. The cesium clock group timing is used as the backup reference, and the GPS is the main reference. In order to prevent the GPS from failing or reducing the accuracy of the benchmark during extraordinary periods, centralized detection, monitoring, maintenance and management should be strengthened to ensure the safe operation of the digital synchronization network.

Network management information: The network management system is a comprehensive management system involving network maintenance, operation and management information. It integrates highly automated information collection, transmission, processing and storage, and integrates performance management, fault management, configuration management, billing management and security management. It is of great significance for maximizing the use of network resources and ensuring network security. . Security management mainly includes system security management, security service management, security mechanism management, security incident handling management, security audit management, and security recovery management.