Security Management of hacker intrusion prevention technology

Source: Internet
Author: User

1. connotation of Information Security Management

According to the description in the requirement of security classified protection management (GA/T391-2002) of China's computer information system, the connotation of information security management is to implement scientific management that meets the requirements of security level responsibilities for the entire lifecycle of information systems in an organization or institution. It includes:

(1) Implement security organizations and security management personnel, clarify roles and responsibilities, and formulate security plans;

(2) develop security policies;

(3) implement risk management;

(4) develop business continuity plans and disaster recovery plans;

(5) select and implement security measures;

(6) ensure the correctness and security of configurations and changes;

(7) conduct security audits;

(8) ensure maintenance support;

(9) conduct monitoring and inspection to handle security events;

(10) security awareness and security education;

(11) personnel security management.

In general, security management refers to a series of management systems and technical measures adopted to achieve information security goals, including all the control processes of security detection, monitoring, response and adjustment. Risk analysis and evaluation of the entire system is an important means to clarify the requirements of information security objectives.

2. Basic principles of Information Security Management

It must be clearly pointed out that no matter how advanced security technology is, it is only a means to achieve information security management. Information security comes from effective management. To make the best use of advanced security technologies, we must establish a sound information security management system, which is a fundamental problem. People (especially senior leaders) always think that information security is a technical problem and put the responsibility of Information Security Management on technical personnel, in fact, this is a very wrong idea and practice.

Currently, information has become an important asset for enterprise development. senior leaders of enterprises must pay attention to information security management and must participate in information security management, regard information security management as an important part of existing management measures.

In our country, we should strengthen our leadership in information security and establish and improve the information security management responsibility system. Generally, the basic requirements are who is in charge, and who is in use, adhere to the general principles: the principle of accountability of the main leaders; Standardized grading principles; legal administration principles; People-oriented principles; moderate security principles; comprehensive prevention and highlighting of key principles; System and Dynamic Principles; and social impact control principles. The main strategies of information security management are: Permission checks and balances, minimum privilege, selection of mature technologies and universal participation.

3. Basic information security management process

Security management is a dynamic process of continuous development and revision, which runs through the lifecycle of information systems, security risk management at the management level, physical level, network level, operating system level, application system level, and operation level. Security management at these levels is the basis for ensuring the correctness, security and effectiveness of information system security technologies and security projects. The overall security goal is to prevent the disclosure, leaks and theft of State secrets and unit sensitive information, prevent unauthorized data modification, loss and destruction, prevent the loss and reduction of system capabilities, and prevent spoofing, ensure the reliability of information and system and the security of assets.

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.