A large application system is like a country, the maintenance of national security and stability requires a set of defense system, the same maintenance of an application system operation also requires a set of security protection system. Next, we will take a look at the system security policy from the state strategy of the High Emperor Zhu Yuanzhang of Daming.
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/6E/B3/wKioL1WDjznS0Hf2AAGAkXRE8us017.jpg "title=" 1.jpg " alt= "Wkiol1wdjzns0hf2aagakxre8us017.jpg"/>
Daming Emperor Zhu Yuanzhang, the eradication of the warlords, the establishment of the Ming Dynasty, unified China; it's like building a huge application system.
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/6E/B6/wKiom1WDjcuhc6ApAAMxOB9Hq_k098.jpg "title=" 2.jpg " alt= "Wkiom1wdjcuhc6apaamxob9hq_k098.jpg"/>
In order to resist the enemy building the Great Wall, it is like in the application system to build a defense against external intrusion of the network firewall.
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/6E/B3/wKioL1WDj-bDvO8IAAMR8Fy-eYQ839.jpg "title=" Jinyiwei. jpg "alt=" wkiol1wdj-bdvo8iaamr8fy-eyq839.jpg "/>
In order to spy on information, supervise the Bai Guan, set up the Jinyiwei, it is like in the system installed in the monitoring of the health of the IDs.
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M01/6E/B3/wKioL1WDj_uDiQxjAAN0aPGso6E636.jpg "title=" the Guardian. jpg "alt=" Wkiol1wdj_udiqxjaan0apgso6e636.jpg "/>
In order to resist foreign enemies, the suppression of the anti-set of the health system, as if the system is installed in the intrusion prevention systems IPs.
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/6E/B6/wKiom1WDjl3RHpxNAAGRP78FC8g563.jpg "title=" should be day. jpg "alt=" Wkiom1wdjl3rhpxnaagrp78fc8g563.jpg "/>
The Central authority-executive Secretariat, and the wealth of the country, and the personal property and concubines of Emperor Zhu-are his core data, the capital of which is the database.
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M01/6E/B3/wKioL1WDkB6hvaYWAAF8V2sFXCk140.jpg "title=" history. jpg "alt=" Wkiol1wdkb6hvaywaaf8v2sfxck140.jpg "/>
In charge of the city's history, it is like a database vulnerability scanning system that discovers database instability factors.
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/6E/B6/wKiom1WDjoOTvMpmAAMIu-0bVaM068.jpg "title=" The Ming Palace Museum jpg "alt=" wkiom1wdjootvmpmaamiu-0bvam068.jpg "/>
Protecting the city's moat and walls is like protecting the database's firewall.
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/6E/B3/wKioL1WDkEKzRI1KAAIZ2OQvWl4486.jpg "title=" Forbidden City. jpg "alt=" wkiol1wdkekzri1kaaiz2oqvwl4486.jpg "/>
The property and concubines of Emperor Zhu in the Forbidden City belong to the core data need special protection, this has the palace, the palace is like the database to protect the core data encryption.
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/6E/B6/wKiom1WDjp6RwMwLAAEF04uHhIw051.jpg "title=" Monitor the history of alt= jpg "wkiom1wdjp6rwmwlaaef04uhhiw051.jpg"/>
That is responsible for monitoring the supervision of the royal history, like the monitoring database status of the database audit system.
Information security protection, like defending the city, need to be impregnable, every device deployed in the system, has his responsibility, for the user to secure a peace, is our security practitioners responsibility.
This article is from the Database security blog, so be sure to keep this source http://schina.blog.51cto.com/9734953/1663500
Amusing Zhu Yuanzhang Unified World and information security system deployment