Information security products are divided into several categories

A, physical security products (physicalsecurityproduct):

The use of certain information computing to achieve, to protect the environment, equipment, facilities and media from physical damage to the information security products. Including:

1, environmental security, regional protection, disaster protection and recovery, disaster recovery plan auxiliary support

2, equipment security, equipment anti-theft, equipment anti-destruction, anti-line interception, anti-electromagnetic interference, power supply protection 3. media security ----- media protection, media data security

Two, the host and its computing environment security category ( hostandcomputingenviromentsecurityproduct):

Deployed in the host and its computing environment, to protect the confidentiality of the user's computing environment, integrity and availability of information security products. Including:

1, identity authentication, electronic information authentication (host), biometric information authentication (host)

2, computing environment protection, trusted computing, host intrusion detection, host access control, personal firewalls, end-use security

3, anti-malicious code, computer virus prevention and control, specific code prevention

4, operating system security. Security operating system, operating system security components

3, network communication security category (networkcommunicationsecurityproduct):

Deployed in the network equipment or communication terminals, used to monitor and protect network communications, to ensure the confidentiality, integrity and availability of network communications information security products. Including:

1, communication security, communication identification, communication confidentiality

2, network monitoring, network intrusion detection, network activity monitoring and analysis

Four, border security (bordersecurityproduct):

Deployed at the border of the security domain, used to defend against attacks, infiltration or security devices outside the security domain on the internal network/host device. host equipment for attack, penetration or security domain internal network / host equipment to the outside leakage of sensitive information information information security products. Including:

1, border isolation, security isolation card, security isolation and information exchange

2, intrusion prevention, intrusion prevention system, network malicious code prevention, availability assurance (anti-DoS)

3, border access control, firewalls, secure routers, secure switches

4, network terminal security, terminal access control

5, content security, security control, security, security, and security.

5, content security, information content filtering and control.

Extended information:

Security Indicators

1, Confidentiality

In the application of encryption technology, the network information system is able to expand the application of the access user Censored, allowing users with privileges to access network information, while rejecting access applications from users without privileges.

2, integrity

In the encryption, hash function and other information technology, network information systems can effectively block illegal and spam, enhance the security of the system.

3, availability

The availability of network information resources is not only to provide valuable information resources to end users, but also to quickly restore information resources when the system is damaged, to meet the needs of users.

Baidu Encyclopedia - Information Security