In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
passing of night. He has been in the field of security for more than ten years. In the past three years, it has also experienced great changes in the whole security field. Safety goes from the minority to the public. As a non-excellent practitioner, he has been surpassed by others. Especially after 2010, the rise of Internet companies, many security cattle are growing up after that. The security focus has also evolved from the traditional IT infrastructure to the Internet security architecture of concern / attack / defense. The waves behind the Yangtze River push the waves ahead. Like the past / infiltration / penetration test is ignored, only a small project in Party B as a security service. Now, because of the needs of the market and the drive of Internet security, it has become a huge one, and many newcomers enter the industry with web security. Because commercial products, especially boxes, fail to keep up, open source products and proprietary development are expanded, and the development of security technology is shifted from Party B to Party A. The earliest contact with security is from the firewall, my personal experience is around 2002. This is the security market has risen, the main target is government enterprises and institutions, mainly to sell firewalls. At that time, network construction had begun to take shape, and network security problems began to emerge. At that time, I joined a network security company, mainly to do security integration, cisco IPX, Tianrongxin firewall, Qiming's IDS, and then the company's own development of firewall. At that time, only one requirement for admission had to pass the ccna. So security is not yet mature at this time, it is only a vassal of the network. At that time, the security construction plan of the company was done by the doctor of Jiaotong University. I had the privilege of seeing a comprehensive security solution for the first time. There are security assessment security reinforcement and security product integration as well as security services. It was done early at that time, and the basic traditional security infrastructure remained unchanged for a long time. It is estimated that this routine will not change until the Internet is securely raised. At the beginning, the defense mainly depended on reinforcement. IDS,firewall and antivirus software are troika can still learn a lot in small companies. I have done security products and security services in a short period of time, and have been resident in customers for a period of time to do safety inspection. They all learn while doing. The company will let you do the main responsibility because no one else. I remember the first time I went to install Cisco pix, the customer said that he had left it in the warehouse because he forgot his password. Can I restore the system? I checked the cisco website on the Internet and soon downloaded the program and imported it into the floppy disk. Used the software to help him recover. Basically, no one is trained by self-study. At that time, we had already started to do security assessment, which was mainly based on network port vulnerability scanning. Reinforcement can only be used for systems and applications. Install at most one antivirus software. And there are not many linux systems, which are oriented to windows. Except for the network layer. The battlefield of the host layer is the desktop terminal. Unlike now, there may only be two or three hundred terminals, but there are two or three thousand servers. The security architecture is mainly intranet security. So the security philosophy at that time was that / attack / strike 70% came from within. I remember that at that time, a company under the Wengguang Group suffered from ddos. But not from the public network. It is mainly caused by the rapid spread of a machine in the intranet after being infected with the virus. Even if the customer's website is attacked / attacked, at most the web page is tampered with, which will not directly affect the enterprise business. However, various security problems in the intranet will lead to business losses. At this time, there is no trend in web business, and the loss caused by public network / attack / attack does not directly affect productivity. In retrospect, after the formation of the trend of web security, the traditional infrastructure is changing, more micro services, cloud services are more and more dependent on the Internet architecture, and the boundaries are disappearing. If from a macro point of view, web security can not represent security, we should see how the proportion of web security is getting more and more serious. And how to virtualize the whole traditional architecture. The desktop becomes a virtual desktop. The server becomes a virtual machine. Cs schemas become bs schemas. Party A has also changed from an intranet IT in the past to a business-oriented operation and maintenance staff. Developers have changed from the business system of intranet to the development of web architecture. The boundaries of the intranet have also changed, such as the use of Aliyun. Many of the intranet are directly connected to a cloud platform of the extranet. Another example is nailing, a micro-service of enterprise OA. The concept of intranet in the past is no longer applicable to the current situation. Now it is more lightweight and distributed. However, there is no change in the change. the mode of large security management and security architecture continues to play a role, such as network security, host security, system security and database security. Or authentication, authorized access, encryption, security assessment, etc. But the concept of secure operations appeared in the seventh edition of cissp. Obviously, with the subdivision of secure subdomains, how to connect these together has become a problem. In the past, it was ISO27001+ISO2000, one was security management system and the other was IT operation and maintenance system. Now the emergence of the Internet architecture the original framework is no longer applicable. De-flow, or lighten the process has become a major issue. How to tailor and change the large framework to form a new technology and management system.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.