Discussion on how to evaluate the network security

Source: Internet
Author: User
Zhoulian Summary: With the development of network technology, network information system has gradually deepened to all walks of life, network security has become a topic of concern, an organization's information systems often face the risk of internal and external threats, if you do not have a certain hacker technology experience and knowledge, it is difficult to fully protect your system. Security assessment is the use of a large number of security industry experience and vulnerability scanning of the most advanced technology, from the internal and external two perspectives, a comprehensive assessment of an organization's information system. This paper mainly discusses how to carry out safety assessment, so that the network management, network security technicians and users to understand how to find out the vulnerability of information system, and strengthen. Key Words: Network security Assessment Vulnerability The first part describes an organization's information systems often face risks of internal and external threats.     With the increasingly advanced hacker technology, without these hacker technology experience and knowledge is difficult to fully protect your system. Security assessments take advantage of the most advanced technologies for Security industry experience and vulnerability scans to conduct a comprehensive assessment of enterprise information systems from both the internal and external two perspectives. Because of the combination of platforms, applications, connections and changes in speed and limited resources, it is more difficult than ever to take all the necessary measures to protect the assets of the organization.   The more complex the environment, the more it needs such measures and controls to ensure continuity in the organization's business processes. Part II Objectives in the project evaluation stage, in order to fully understand the current security situation of enterprise-specific Network Information system (security hidden danger), therefore needs to the network system security condition analysis. Upon confirmation from both sides of our security team and the Enterprise Information Center, the following selected items are evaluated. Evaluation of the management system · Assessment of physical Security · Computer system security Assessment · Evaluation of network and communication security · Assessment of log and statistical security · Assessment of safety and security measures ·   The overall assessment then analyzes the security weaknesses and writes out the report as an important reference to improve the overall security of the enterprise network system. Part III demand and present situation   first, the network practical application of the Enterprise network system is a specialized network structure, through the proxy access to the Internet. This evaluation of the enterprise network system is the company's internal LAN, responsible for the company's network office, communications and information dissemination, and corporate information system communications and other tasks. second, the service needs can be listed according to the specific circumstances of the network applications required by the enterprise.   such as Web applications, Internet applications, network communications, SQL Server-formatted databases, and so on. Part Fourth Assessment steps The security evaluation of the company's network system is generally divided into five steps: The first step is to carry out the security evaluation of the entity. The second step is to evaluate the security of network and communication. The third step is to evaluate the security of the practical application system. The fourth step, the assessment team by the engineers in person to evaluate the results of the analysis and summary, and some of the project manual testing, to eliminate the false. The fifth step, based on the results of the assessment, draws the assessment report. The sound management system is a strong guarantee of network security, including computer room management system, document equipment management system, management personnel training system, system use management system. 1, the evaluation of the assessment of the time, the assessment of the location, assessment of the manner of detailed description. Different time assessment time, even if the assessment site, the same way of assessment, there will be different test results, the same different assessment methods, the same time, place results vary greatly. So be sure to explain these aspects in detail before you evaluate them. 2, the Evaluation content evaluation content includes the following aspects, the computer room management system, document equipment management system, management personnel training system, system use management system, etc., can be recorded in a form similar to the following. 3
number project Security Risk Detailed description
high medium low
1 Center room   /td>      
2 document management        
system Maintenance        
4 device use       &nbs P
5 Manager Training        
6 customer comments Record user comments and let users sign them.
3,
The Evaluation Analysis Report carries on the detailed appraisal to the company's Information Network system Management system, and carries on the detailed analysis to the each appraisal result, discovers the reason. Explain what vulnerabilities exist, for example, because the company's network information system has just been established, the management rules and regulations are not sound, for the future management left hidden dangers, network system Management there are many loopholes. 4, Propose preliminary comments, such as sound management rules and regulations. Of course, the specific opinions should be put forward in the reinforcement. Physical safety Physical security is the basis of information system security, we will be based on the entity security standards, the implementation process will be identified as the following testing and optimization projects. 1. The assessment notes are similar to the evaluation notes for the management system, for example: Assessment time: March 29, 2003 Morning Assessment site: Center room evaluation Mode: Artificial Analysis 2, the assessment of physical security generally includes site safety, room environment, building safety, equipment reliability, radiation control and leakage prevention, communication line security, power security, disaster prevention and recovery measures. Refer to the following table:
Number Project Security risks Detailed description
High In Low
1 Site Safety Location/Floor
Anti - theft
2 Computer room Environment Temperature/Humidity
Electromagnetic/noise
Dustproof/Electrostatic
Vibration
3 Building Fire
Lightning Protection
Wall
Access
4 Equipment reliability
5 Radiation control and leak prevention
6 Communication line Security
7 Power Power
Air-conditioning
8 Disaster prevention and recovery
9 Customer Comments Record user comments and let the user sign.








3, the evaluation of the analysis report through the company's site survey of various nodes to see if there are the following unsafe factors. • Site safety precautions are appropriate. • Building safety measures are perfect. L room environment is good or bad. • Reliability of network equipment. L Radiation control safety is not considered. • Safety of communication lines. L Dynamic reliability. • Disaster prevention and recovery capabilities. 4, the proposed computer room design or alteration should conform to GB2887, GB9361 and GJB322 and other existing national standards. In addition to the above relevant standards, attention should also be paid to meet the following requirements: (1) The main structure of the computer room should have the function of the durability, seismic resistance and fire resistance grade. Deformation joints and expansion joints should not pass through the main engine room; (2) The computer room should be set up the corresponding fire alarm and fire extinguishing system, (3) The room should be set up evacuation lighting equipment and safety exit signs, (4) the computer room should use special air-conditioning equipment, if with other systems, should ensure the effect of air-conditioning, the use of fire isolation measures. A standby air-conditioning system should be in place for a long term continuous operation. Air conditioning refrigeration capacity, to leave a certain margin (appropriate to take 15%-20%); (5) The computer's special air-conditioning equipment should be connected with the computer to ensure that the first air supply before the boot, stop after the Wind; (6) The room should be in accordance with the quality of power grids and computer equipment requirements, the use of power quality improvement measures and isolation protection measures, such as filtering, voltage regulator, frequency stabilization and uninterruptible power supply system. (7) The equipment used in the computer system shall conform to the requirements stipulated in the GB4943, and is a qualified product after security inspection. third, computer system security platform security refers to the operating system and general basic services security, mainly used to prevent hacker attacks, the current market, most of the security products are limited to the solution platform security, we use the General Information security assessment criteria for the determination of the Platform security implementation process including the following:

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.