This is the ninth day of my participation in the August More text Challenge. For details, see: August More Text Challenge

Security architecture

The security architecture of information processing system (GB/T 9387.2 — 1995) defines five types of security services, which are authentication service, access control service, data confidentiality service, data integrity service and anti-repudiation service.

Data integrity services

The purpose of data integrity services is to protect the integrity of data and data-related properties that may be compromised in different ways by preventing or detecting threats, that is, to ensure that data is not altered or corrupted in unauthorized ways. Common implementations of data integrity include:

A mechanism for blocking access to data transmission media.

The functions include physical isolation, undisturbed channels, routing control, and access control. In order to prevent sniffing in the data transmission medium, we use VPN to connect to the internal network in many cases, so as to ensure the security of data and prevent the malicious third party from intercepting our data from the network.

Blocking access to the data transmission medium

To enable the HTTPS

Enable HTTPS is one of the most simple way, we need to note is that make sure the whole web site under the protection of the HTTPS, if you enable HTTPS web, but there is no enable HTTPS js and pictures on a page, or from the network can determine our current in which pages, for it is not safe.

The password is encrypted on the client

Nowadays, many websites carry out MD5 encryption on the user’s password before the database is dropped, without considering that the user’s login information may be stolen in the process of transmission, or be recorded by the developer when printing the Log, which is a major hidden danger to the security of user data. So now generally in the user side are using encryption JS to encrypt the password passed by the user, here can use MD5. Js to encrypt the data once, but how about this method? I think it is not good, because it will cause that we have no way to verify the user’s password, for example, we need to verify the strength of the user’s password or prevent the user’s password from repeating before. You can consider using asymmetric encryption algorithms such as RSA, using the public key to encrypt at the front end and using the private key to decrypt at the back end, so as to ensure that even if the malicious personnel log in to the data transmission medium, they can not get the sensitive information of the user!

Mechanism to detect unauthorized changes to data.

It includes sealing, digital signature, data duplication, digital fingerprint and message serial number combined with password transformation.

Repudiation resistant services

Y The anti-repudiation service is the provision of evidence relating to a specific event or behavior, including the generation, verification and recording of evidence, as well as the immediate recovery and reverification of evidence when a dispute is resolved. The implementation of anti-repudiation service mainly includes digital signature, user authentication, operation log and other technologies. In the current system, electronic signatures are all signed on USB flash drives, such as the peace of mind signature of China Financial Certification Center (CFCA), which are used to provide anti-repudiation services, and are essentially equivalent to digital signatures of documents. Generally, it is signed on the Pdf, and it needs to pay attention to revoke the signature. Here, for the record of daily internal user operations and important functions, such as transfer and recharge, operation logs should be recorded, recording time, user account, corresponding IP and other information, so as to prevent the failure to trace after the problem occurs.