In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
We often talk about enterprise information security, which can be regarded as a discipline. I won't talk about such complicated principles here, but only talk about the degree to which ordinary enterprises can achieve relative security levels. After all, the security level was set too high, which reduced efficiency; the security level was set too low, which was the same as not setting security.
Security is mainly divided into foreground and background security. The foreground here mainly refers to the behavior security of the user side, and the background refers to the back-end operation security of IT personnel.
The picture can't be uploaded. There are pictures here. You can pay attention to WeChat.
Front desk security:
Access control: First of all, from the user to enter the door, the authority of the door card has a great binding force on the control of outsiders. If there are too many doors, set the authority according to different regional departments, and visitors can set the visitor authority and set the deadline. In addition, the access control settings are not closed, automatic alarm response, etc. Some people think this is administrative work, I think this is more for IT IT to control and decision-making power, from the access control can effectively control outsiders.
Network interface control: Come to the workstation, open the notebook, access the company network, let's talk about network security. All wired networks are configured to bind mac addresses to mobile devices or fixed PCs, and wireless networks are configured to bind authenticated devices or authenticate through domain accounts. Please use guest mode access if guests use.
Account security mechanism: user login notebook, AD user or local account authentication login, password needs to meet the preset 8-character complex requirements, regularly prompt to change password. Lock screen mechanism, etc.
Behavior monitoring: Open the computer, open IE, and first prompt to log in to the Internet behavior authentication account: Internet behavior management can effectively monitor all behaviors of users on the Internet and prohibit illegal operations.
Anti-virus strategy: After starting work, antivirus software effectively monitors all your behavior operations and cleans up harmful viruses in time. At noon or evening, the virus database will be updated regularly to detect and kill viruses.
Data security: For data interaction at work, physical network zone isolation mode is adopted for files with higher security level, that is, security data is separated from office data. If it is unconditionally separated, firewall can be used for policy control. or the security data is arranged on the security server, and the user terminal acquires the related data by adopting an encryption and decryption mode. The intermediate security level can be controlled by remote login to the server and related security control on terminal access rights (for example, prohibit mapping all ports, COPY, sharing, etc.), or by process + data encryption control software.
Interface security: USB interface, whether the PC is locked, etc. Hardware protection. This is available on demand.
Background Security:
Computer room safety: IT needs to be fire-proof, electricity-proof and air-conditioning, and the safety inspection of the computer room environment needs to be careful and in place, and inspection mechanism is needed.
Server security: The system status and hardware status of the server remain stable, data redundancy and regular backup.
Log audit: the user's online behavior, account behavior to do well documented, firewall logs, system logs check, traffic monitoring and so on.
Vulnerability monitoring: plugging vulnerabilities in systems and firewalls, patch push systems
In addition, the security of the foreground and background must develop a perfect process mechanism as a means to cooperate with perfection, so that both the foreground and the background can effectively understand and implement.
I think through the above foreground and background security settings, you can basically achieve effective prevention and can achieve basic security levels. Some people see this may say, what U disk shielding, data verification, smart card control, etc., in fact, I talk about here is only a basic network security, can meet the above standard requirements, personally think your enterprise is with information security.
Please pay attention to my micro signal: ithelpyou, search or open the link below to scan it, thank you.
http://mp.weixin.qq.com/s?__ biz=MjM5NDUxNTEzMw==&mid=2247483745&idx=1&sn=a7627b7b8f5f7631bcfb09345c1f4435#rd
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.