Amusing Zhu Yuanzhang Unified World and information security system deployment

Source: Internet
Author: User
Tags ming

A large application system is like a country, the maintenance of national security and stability requires a set of defense system, the same maintenance of an application system operation also requires a set of security protection system. Next, we will take a look at the system security policy from the state strategy of the High Emperor Zhu Yuanzhang of Daming.

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/6E/B3/wKioL1WDjznS0Hf2AAGAkXRE8us017.jpg "title=" 1.jpg " alt= "Wkiol1wdjzns0hf2aagakxre8us017.jpg"/>

Daming Emperor Zhu Yuanzhang, the eradication of the warlords, the establishment of the Ming Dynasty, unified China; it's like building a huge application system.

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/6E/B6/wKiom1WDjcuhc6ApAAMxOB9Hq_k098.jpg "title=" 2.jpg " alt= "Wkiom1wdjcuhc6apaamxob9hq_k098.jpg"/>

In order to resist the enemy building the Great Wall, it is like in the application system to build a defense against external intrusion of the network firewall.

650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/6E/B3/wKioL1WDj-bDvO8IAAMR8Fy-eYQ839.jpg "title=" Jinyiwei. jpg "alt=" wkiol1wdj-bdvo8iaamr8fy-eyq839.jpg "/>

In order to spy on information, supervise the Bai Guan, set up the Jinyiwei, it is like in the system installed in the monitoring of the health of the IDs.

650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M01/6E/B3/wKioL1WDj_uDiQxjAAN0aPGso6E636.jpg "title=" the Guardian. jpg "alt=" Wkiol1wdj_udiqxjaan0apgso6e636.jpg "/>

In order to resist foreign enemies, the suppression of the anti-set of the health system, as if the system is installed in the intrusion prevention systems IPs.

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/6E/B6/wKiom1WDjl3RHpxNAAGRP78FC8g563.jpg "title=" should be day. jpg "alt=" Wkiom1wdjl3rhpxnaagrp78fc8g563.jpg "/>

The Central authority-executive Secretariat, and the wealth of the country, and the personal property and concubines of Emperor Zhu-are his core data, the capital of which is the database.

650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M01/6E/B3/wKioL1WDkB6hvaYWAAF8V2sFXCk140.jpg "title=" history. jpg "alt=" Wkiol1wdkb6hvaywaaf8v2sfxck140.jpg "/>

In charge of the city's history, it is like a database vulnerability scanning system that discovers database instability factors.

650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/6E/B6/wKiom1WDjoOTvMpmAAMIu-0bVaM068.jpg "title=" The Ming Palace Museum jpg "alt=" wkiom1wdjootvmpmaamiu-0bvam068.jpg "/>

Protecting the city's moat and walls is like protecting the database's firewall.

650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/6E/B3/wKioL1WDkEKzRI1KAAIZ2OQvWl4486.jpg "title=" Forbidden City. jpg "alt=" wkiol1wdkekzri1kaaiz2oqvwl4486.jpg "/>

The property and concubines of Emperor Zhu in the Forbidden City belong to the core data need special protection, this has the palace, the palace is like the database to protect the core data encryption.

650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/6E/B6/wKiom1WDjp6RwMwLAAEF04uHhIw051.jpg "title=" Monitor the history of alt= jpg "wkiom1wdjp6rwmwlaaef04uhhiw051.jpg"/>

That is responsible for monitoring the supervision of the royal history, like the monitoring database status of the database audit system.

Information security protection, like defending the city, need to be impregnable, every device deployed in the system, has his responsibility, for the user to secure a peace, is our security practitioners responsibility.


This article is from the Database security blog, so be sure to keep this source http://schina.blog.51cto.com/9734953/1663500

Amusing Zhu Yuanzhang Unified World and information security system deployment

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.