Paper Keywords: electronic security technology security elements of information security
Abstract: With the continuous development of China's information technology, electronics and information security for the protection of small and medium enterprises has also become the focus of attention. In this paper, electronic information security as the main body, introduce SME informatization construction, electronic information security technology overview, presenting key security elements, to find solutions to the problem of SMEs in electronic information security strategy.
In the enterprise management information system has many business documents in circulation, which is certainly of importance file, and some even to the future development of enterprises involved, if such information is transmitted over the network in general by competitors or criminals wiretapping, leaks , tampering or forgery, it will seriously threaten the development of enterprises, so that SMEs electronic information security technology research has important significance.
First, the significance of information technology SMEs in this Information Age, the company's continuous development process of information, information has become the key to success, but also an important way to improve the management level and now business activities of enterprises, basically using electronic Business forms, the production operations, transport and sale of all aspects applied to the information technology, such as through the network to collect some information about raw materials, quality, price, place of origin and other information to create a raw materials information system, the information system for raw materials procurement has a significant role through the analysis of the data can be obtained with the number of procurement proposals and countermeasures, electronic information enterprise level. survey shows that SMEs Eighty-two percent of the site should also be in promote corporate image, publishing products and services, to collect customer information at this stage, while e-commerce transactions related to the application of this less than a quarter, indicating that companies have not yet fully developed and the use of commercial channels information. SME information era has come, enterprises should speed up the construction of information.
Second, the electronic information security technology elaborated an electronic information encryption technology encrypts data transmission technology enables more security and integrity, encryption technology is divided into two kinds of symmetric and asymmetric encryption which is usually symmetric encryption password or via serial packet confidentiality to achieve, including plain text, key, encryption algorithms and decryption algorithms such as five basic components. symmetric encryption and asymmetric encryption are different, asymmetric encryption requires a public key and a private key two keys, a public key and private key pair to be used for encryption using the public key, only the corresponding private key to decrypt the private key used for encryption, and only with the corresponding public key can decrypt it.
Encryption technology to transmit electronic information confidentiality can play role in the transmission of electronic information, the sender using the encryption key or algorithm to encrypt the information sent after its issue, if someone steals the information during transmission, he only can get the ciphertext, the ciphertext is incomprehensible. accept the decryption key can decrypt the ciphertext to restore the plaintext.
2, firewall technology with the development of network technology, some of the mail bombs, viruses, trojans and online hackers on network security also caused a great threat. Enterprise information network has also been making similar threats, corporate electronic information security can hardly be guaranteed. unsafe situation for the network, initially took a protective measure is a firewall in our personal computer firewall also played a big role, it can prevent non-hackers, computer information of tampering.
3, message authentication and identity authentication technology certification is two forms of authentication technology, message authentication is mainly used to ensure the integrity and anti-repudiation, user authentication via message to confirm whether the information is true and modified or falsified by a third party . authentication using the user's identity and identification, including the identification and validation in two steps. clearly identify and distinguish the identity of visitors to confirm identity of visitors called authentication. Users access to some non-public resources must pass authentication, such as Visit colleges check subsystems, you must go through Student ID and password authentication to access. Some university library resources in order to access the campus network, campus network can not enter non-unless the request and pay for a qualified access status.