In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-24 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >
Share
Shulou(Shulou.com)06/01 Report--
I. the present situation of the system
The enterprise has implemented informationization for many years, the headquarters network covers many buildings of the hospital, and firewalls and intrusion detection systems are deployed in the data center computer room. More than 30 branch enterprises across the country regularly submit statistical data to the headquarters, and the access areas are logically isolated through firewalls.
At present, the enterprise has established a number of application systems, including portal website, OA system, financial system and statistical analysis system. The backstage database of these systems adopts Oracle 9i, 10g and SQL Server2000/2003 database systems, and is accessed by JDBC, ODBC, PowerBuilder and other client software.
II. Medium Envis solution
In order to meet the requirements of database disclosure, monitoring and availability, a database audit and firewall product (VS-DAF) and a database transparent encryption product (VS-EC) are deployed.
Database audit and firewall can monitor and record the access behavior of internal users to the database, and can also detect SQL injection attacks from the external network to protect the security of the database. At the same time, the memory usage, user scale and response speed of the database are analyzed to find the hidden trouble of performance in time and remind the administrator to optimize it.
The database is encrypted transparently and encrypts the core data of the enterprise to ensure the security of confidential information. even if there is a risk of physical media replication, data file loss and other risks, unauthorized people can not read the contents of the database.
Third, user income
1. Grasp the health and security status of the database system in real time to ensure the efficient operation of the business.
2. Internal control plus external defense to ensure that the database will not be attacked, and that all kinds of access to the database can be checked.
3. Double protection of core data to ensure that confidential information will not be disclosed.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.