In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-02 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Operation and maintenance is inseparable from safety and security, there is no value without operation and maintenance.
Speaking of operation and maintenance safety, Mr. Guo said that enterprise operation and maintenance safety should first start from the business, consider how to do a good IT system support for enterprise business, and provide a stable platform to support enterprise business development, which is the basis of operation and maintenance. From a security point of view, operation and maintenance is an indispensable link. Operation and maintenance is inseparable from security, and security has no value without operation and maintenance.
The traditional mode of operation and maintenance is to purchase, build and manage the equipment as real estate. With the rapid development of cloud computing, big data and mobile Internet, the security work of enterprise operation and maintenance has brought great subversion and changes.
First, from procurement, construction and simple extensive management to the current cloud-based business, more focus on equipment to focus on business, which is a great change.
Second, from a data point of view, there are a lot of data to support the business development of enterprises, with a large amount of data and many dimensions. Therefore, the interpretation of the data is a great challenge. Now we not only need to manage the databases and servers of PC, but also manage our data, mobile clients, applications, etc., associate these dimensions, and analyze the problems in operation and maintenance, as well as problems in business development.
Each business is very different, and different industries have different businesses. But in the final analysis, it can be divided into several categories. In the correlation analysis of the business, the first thing is to look at the rules, each behavior has its own rules, such as procurement rules, time rules. The third is visualization, no matter how large the amount of data, its law is objective, and time also exists relatively, as long as these objective laws and relative time data are collected, and events are interpreted in a visual way, in order to find the focus in the business point of view. Therefore, although the business is very different, we can interpret all kinds of business as long as we grasp the three foundations of law, time and visualization.
From "No accident, save money" to "No accident, Don't lose money"
In the past, the core of traditional operation and maintenance was "OK if nothing happens, save money". Under this goal, our operation and maintenance work is a very simple process. In the case of saving money, the value of operation and maintenance can not be brought into full play, and the interpretation of the business can not be reflected. If you want to do a good job of security in the process of operation and maintenance, it is nothing more than setting a vulnerability detection mechanism and doing scanning. We often say that loopholes must be patched within three days or one working day. In fact, there is no time for quantitative assessment from the discovery of vulnerabilities to the cycle of processing. This also reflects the problem of subjective updating of operators. When there is a virus, people who engage in operation and maintenance often stay up late, eat irregularly, lack of exercise, and the operation and maintenance personnel will be very hard.
In the data age, in the face of ever-changing emerging threats and unknown threats, we need to sum up a good methodology and use data to express it. Around the business, to "no accident, do not lose money" as the core to do operation and maintenance, to ensure safety. Through the process to guide compliance, select the most appropriate business, improve the business operation model, combine vulnerabilities and logs, and observe what kind of attack the system and the host have suffered, failure or success. Finally, the operation and maintenance strategy is adjusted according to the results of data analysis.
Difficulties and key points in the safety work of operation and maintenance
As an enterprise CSO or enterprise operation and maintenance safety management personnel, what are the difficulties in his operation and maintenance safety management work, and where should the emphasis be placed? Teacher Guo believes that the difficulty of enterprise operation and maintenance safety lies in the low overall safety awareness of both employees and bosses in the enterprise, and it is necessary to strengthen the safety of enterprise operation and maintenance after comprehensively raising everyone's safety awareness.
Personal opinion:
Of course, the above are the views of teacher Guo Liangguo. I only know which side to speak. Most Chinese people learn a lesson, and they inevitably don't pay attention to network security because they don't think it necessary. Things that have never been experienced are often ignored. Just wait for the experience and not necessarily adhere to the past. Once again, if there is no redundant opinion, the recommended network security should be prepared in advance and use SSL digital certificates as soon as possible. SSL certificate can encrypt website customer data, prevent customer data from being embezzled, increase customer trust and increase transaction volume. In short, the SSL certificate is essential under the mainstream of the secure network. Even Baidu has no trading project to do https of the whole site. Your website security certificate Brooks no delay. It is our common wish not to lose money even if something goes wrong.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.