In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
one,
Warm station: the warm station is difficult to test because it has only equipment, no employee and company data, and 36 hours of recovery.
Hot station: the hot station contains all the alternate computers and communication equipment needed in all disasters, and testing this environment is simple. Restore.
Cold station: cold station is the most difficult to test because it is a basic room with limited equipment and can be restored within 72 hours.
two,
Event response process: preparation, identification, containment, eradication, recovery, lessons learned.
three,
Technical controls: also known as logical controls, technical controls are used to restrict data access and operating system components, security applications, network devices, and encryption technologies.
Detection control: detection control detects and exposes violations when they occur. Ids, audit log, cctv, access control
Preventive control: preventive control avoids security breaches or disruptions prior to the occurrence of a critical service. Router, cable lock, data backup
Management control: administrative control controls how security policies should be implemented to achieve the company's security objectives.
Corrective control: designed to correct a situation. For example: antivirus software, such as disaster recovery plan
Deterrent control: used to warn potential people not to *. Lights at the border, warning signs, playing CAPTCHA codes, computer lock screens
Compensatory control: a requirement used for a security countermeasure that is too difficult or impractical to be implemented at present.
Physical control *: is a security measure to reduce the risk of destroying physical assets. This includes protecting employees, hardware, software, networks, and data from physical behaviors and events that may lead to damage or loss, such as cctv, motion detection, and fences.
Administrative control: controls how security policies should be implemented to achieve the company's security objectives.
four,
Business impact Analysis (BIA) determines the potential impact of an outage on the company's operations as a result of a disaster or emergency
five,
Disaster recovery Plan (DRP) is a kind of
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.