In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
At 2:30 in the afternoon, banks, telecom operators, game giants, well-known universities, famous foreign security manufacturers, well-known domestic security manufacturers, airlines and other large-scale enterprise security experts and backbone figures in Beijing gathered together to carry out exchange activities with the theme of information security risks and trend analysis of large and medium-sized enterprises.
First of all, the keynote speech was carried out by Mr. Zhang Shengsheng, an information security consultant of the Ministry of Industry and Information Technology, taking the hidden dangers of information security faced by large and medium-sized enterprises in the actual production and operation as a starting point, pointing out the importance of the current information security work to enterprises. And according to Mr. Zhang's experience in related research for many years, the hidden dangers of information security are divided into seven main levels, covering:
1. Hidden dangers of process loopholes in the business layer
two。 The hidden danger of system deficiency in the management
3. The hidden danger of lack of means in the application layer
4. The hidden danger of powerless control in the database layer
5. The hidden danger of matching in the operating system layer
6. The hidden danger of lax monitoring in the network layer
7. Hidden dangers of unknown responsibilities in the physical layer
Through a vivid and clear explanation, the participants have deep feelings that the hidden dangers of information security in large and medium-sized enterprises are still very serious. At the end of the speech, Mr. Zhang stressed that information security is still a sunrise industry in China, and we need to draw on collective wisdom and make common progress. Therefore, if we set up relevant organizations to bring together outstanding talents in information security work on a regular basis to carry out discussions and exchange activities, we will certainly be able to contribute to the all-round development of the information security industry, and in this way, Chinese Dream, an information security professional.
Inspired by teacher Zhang, the attendees said one after another that they gained a lot from teacher Zhang's speech and sighed a lot. As information security practitioners, they all have a dream of peace and security, and they all hope to add bricks to the cause of information security. With regard to the establishment of an information security expert committee, everyone also strongly agreed and offered suggestions, and made full discussions and speeches on the form, content and time of the activities.
At the meeting, Sun Jing, winner of the "Capital May 1 Labor Medal" and winner of the 2010 Beijing Workers' Vocational skills Competition Network Information Competition, also spoke at the meeting, describing her many years of experience in the information security industry. Minister Ye of Beijing Workers and Technical Association, the organizer of the conference, sincerely invites you to share your experience and areas of expertise with you in the future, and welcomes more information security experts and technical backbones to join the exchange team.
Chinese Dream is not only the dream of you and me, the dream of every child of the Chinese nation, but also the dream of every domestic information security practitioner. Perhaps it is difficult for one person to effectively promote the development of the entire information security industry, but through this form, we can gather together, unite as one, and work together to help the dreams of the information security personnel. it will certainly be able to promote the rapid development of the information security industry, and it will certainly be able to realize Chinese Dream in the hearts of information security people!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.