In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Introduction: the network is out of control
The founders of Internet would never have imagined that Internet would grow to where it is today. According to statistics, the daily traffic of Internet access and download in the world reached one million TB in 2007, which is about 10000 times the total information of the Library of Congress in the United States. However, for business users, large traffic is not always a good phenomenon, and the negative impact of excessive flow and wanton dissemination of information on business users is also obvious.
With the click of a mouse, the personnel in the local area network can copy thousands of copies of an internal document and send them to any corner of the world in an instant. The impact on the business reputation and economic security of an enterprise is incalculable.
In the face of disadvantages, the practice of most enterprises is to either issue strict management regulations and rules and regulations and try to standardize the use of the Internet by administrative means, or make a big fight to carry out the overall transformation of the internal network. block the Internet access of intranet users. However, although these means reduce the negative impact of the Internet to a certain extent, they also give up all kinds of convenience brought by the Internet and do not fundamentally solve the problem.
1 the advent of the era of online behavior management
As a leading supplier of cutting-edge network equipment, Shengxin Technology Co., Ltd. is the first to launch a series of AC online behavior management products, which opens a new way to solve network management problems by means of IT technology. AC equipment is deployed at the exit of the local area network, which can block unnecessary network applications, control the abuse of network bandwidth, prevent the risk of leakage through the network, and comprehensively improve the work efficiency of employees and avoid the leakage of enterprise confidential information.
1.1 IM chat Monitoring
Theoretically, as long as the information sent from the internal network to the external network, the information flow can be recorded and audited as long as the network behavior management device is used. However, for the sake of evading monitoring and management, the designers of network software are more and more inclined to design all kinds of "encrypted" network application software, such as instant messaging software represented by QQ,Skype. Even MSN under the VISTA operating system starts to enable information encryption by default. I am convinced that AC monitors and records chat content through in-depth content inspection (Thorough Content Detection, TCD) and content synchronous listening (Real-time Monitor for Messages, RMM). At present, RMM can achieve QQ, MSN Messenger (shell), NetEase bubble (POPO), Sina UC, ICQ, Skype, Google Talk, Yahoo! Complete monitoring of chat content of all kinds of IM, such as Messenger.
1.2 Mail delay audit
Email leakage is recognized as the most important way for insiders to leak secrets, and it is also the main way for spyware such as Trojans to transmit information. Traditional technical means can only be audited afterwards, however, the loss has been irreparable. I am convinced that email delay audit technology (Postponed Sending after Audit, PSA) provides a reliable way for enterprise users to protect email content. PSA uses mail transfer technology. The mail sent by the private network user is first transferred to the mail cache of the gateway by the AC gateway. The mail examiner accesses the mail cache through the system password and examines the email body and its attachments. Those emails involving confidential information, intrusive language, illegal URL and personal privacy will be returned to the sender or discarded.
1.3 Network admission rules
In addition, even if the user's network exit is running firewalls and other network peripheral security devices, Trojan horses and spyware are also the main threats to passive disclosure by enterprises, and only the desktop has sufficient security measures to effectively prevent such leaks. Network access rules (Network Admission Rules, NAR) achieve network access control through the security assessment of the client, and extend the Internet behavior management to the desktop.
1.4 avoid over-monitoring
When people talk too much about the benefits of monitoring to the enterprise industry, they often ignore the disadvantages brought by excessive monitoring. the reality is that the network behavior of some sensitive departments and enterprise management itself involves business privacy at the enterprise level. on the contrary, the record storage of this part of the content increases the possibility of leakage. In view of this situation, we are convinced that the Internet behavior management program solves such two difficult problems through the "monitoring-free" Key, and the end-users holding the "monitoring-free" key can access the Internet without restrictions by network management personnel, avoiding the possibility of leakage caused by excessive monitoring.
1.5 unnecessary application of plugging
According to statistics, 37% of the online activities of Chinese employees during working hours have nothing to do with work, and online surfing, online games, online stock speculation, online chat and so on seriously affect the work efficiency of employees. At the same time, the network performance is deteriorating. Downloading software such as P2P takes up a lot of network bandwidth, which will affect the normal use of the business system. For enterprises with about 1000 employees, the loss of productivity caused by Internet abuse may be as high as 3 million RMB a year. In this regard, convinced that AC provides a set of humanized management strategy, administrators can allocate reasonable Internet time to various departments and individuals according to business conditions, and can specify different Internet access limits for different times, which effectively improves the work efficiency of the organization.
2 A typical case of a provincial electric power company
To cite an example, a provincial power company has 7000 intranet office users. in order to enhance the security of the use of the Internet, it has considered rebuilding the network topology and physically isolating the office network area from the Internet. on the one hand, it will hurt the existing network, and on the other hand, it is not true to completely isolate the office network from the Internet. By deploying a convincing AC as a bridge at the Internet exit, you can do this:
1) prevent internal information from being actively leaked to the Internet through BBS, IM, email, blog, etc., and effectively monitor encrypted IM, enable delayed audit of emails for sensitive departments in special periods, and do pre-audit of external emails.
2) through the blocking of online games, online stock speculation, P2P and other applications during working hours, the overall office efficiency of the organization is improved.
3) Control Trojans and spyware to steal internal secret information through client security scanning and mail audit functions.
4) key production departments, management personnel are equipped with "monitoring-free" Key to prevent the danger of leakage caused by excessive monitoring. [@ more@]
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
Http://is.gd/QOv3eN attachment: http://down.51cto.com/data/2363158
© 2024 shulou.com SLNews company. All rights reserved.