In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
DSA data security isolation is one of the effective means of current data anti-disclosure technology, which is mainly used for software and hardware development enterprises or departments of source code anti-disclosure, regardless of whether the source code is located in the terminal or SVN and other servers, it can be protected.
Basic principles of DSA data Security isolation Technology
By means of multiple isolation techniques such as disk, storage and network, one or more source code security zones are constructed on multiple terminals as needed. The use of the source code in the terminal security zone is not subject to any restrictions, and the normal flow and use between multiple security zones does not affect the daily work, only when the source code is to be separated from a certain security zone. Because it does not deal with the source code itself in the whole protection process, the phenomena such as card, slow and blue screen when using document encryption software to protect the source code can be fundamentally avoided.
Implementation effect of DSA data Security isolation Technology
1) Source code security isolation: the source code security is ensured by building a security zone in the PC terminal. In the security zone of the PC terminal, the source code cannot be leaked out of the security zone by any means such as disk, network, port peripherals, etc.
2) safe flow of source code: between the security zones of each PC terminal, the source code can be transferred normally through policy setting, including the flow of source code with the SVN server, which is unimpeded, safe and does not affect the normal work.
3) external audit of source code: if the source code in all security zones (composed of SVN servers and security zones on PC terminals) is sent out, it must pass the audit and have detailed log records for subsequent query and accountability.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.