Current location - Trademark Inquiry Complete Network - Futures platform - What are the laws and regulations related to information security?
What are the laws and regulations related to information security?
1 and 1996 issued the Measures for the Administration of International Networking of Public Computers in China.

2.1February, 1994, "Regulations on Security Protection of Computer Information System in People's Republic of China (PRC)" was issued.

3. The Interim Provisions on the Administration of International Networking of Computer Information Networks in People's Republic of China (PRC) was issued in February 1996.

4. 1997, 12, and the Interim Provisions on the Administration of International Networking of Computer Information Networks in People's Republic of China (PRC) came into effect.

5. Articles 185 and 286 of the new criminal law.

With the diversification of information security problems, customers need to solve more and more information security problems, and more and more information security means are needed to solve these problems. Ensuring the security of computer information systems and networks, especially the security of national important infrastructure information systems, has become a major problem that must be solved in the process of informatization construction.

It is in this context that information security has been promoted to an unprecedented height. The state has also put forward guiding requirements for information security construction from a strategic perspective.

Extended data:

The relationship between information security and technology can be traced back to ancient times. Egyptians carved puzzling hieroglyphics on stone tablets; Spartans used a tool called a cipher stick to communicate their military plans. Julius Caesar in Roman times was one of the generals who encrypted letters in ancient times. Julius Caesar's code is said to be an encryption system used by Julius Caesar to protect important military information in ancient Rome.

It is an alternative password, which plays an encryption role by pushing the letters back three places in sequence, such as replacing the letter A with the letter D and replacing the letter B with the letter E. alan turing, the father of British computer science, helped to crack the Enigma password of the German navy at Blackley Manor in England, thus changing the course of World War II. NIST in the United States divides information security control into three categories.

(1) technology, including products and processes (such as firewall, antivirus software, intrusion detection, encryption technology).

(2) Operation mainly includes strengthening mechanisms and methods, correcting operational defects, operational defects caused by various threats, physical access control, backup capability, and protection from environmental threats.

(3) Management, including the use policy based on information security, staff training, business planning and non-technical fields. Information system security involves policies and regulations, education, management standards, technology and so on. Any single level of security measures can not provide all-round security, so we should consider security issues from the perspective of system engineering. Figure 8- 1 shows the NSTISSC security model.

Baidu Encyclopedia-Information Security Regulations