Evaluation of China's network security 3

Source: Internet
Author: User

Network security is the lifeblood of every organization, but it has not been supported and recognized by more people. Just as the nervous system of our body seems to be important to everyone, but we don't have to take the initiative to perform a physical examination. Is it worthwhile to spend a lot of money to cure the fault? Network security is guaranteed by means of isolation, just as we live in a world with only oxygen and no other things. Units attacked by a security event adopt the "cool and cool" rule. Is it cool if the quilt is covered too much?

Everyone has experienced the cold winter. In cold times, we often say that it seems correct to cover a few more quilts. What I want to say today is, have you ever covered several quilts and still have to turn over to warm your back? The back is warm, that is, your spine is warm, isn't it more comfortable to sleep? This is the misunderstanding we entered. It's cool to cover the quilt, but why not increase the thickness of the cotton pad at the same time to protect the cold?

Network Information Security is the same. If you are afraid of information leakage, you cannot buy more security devices, such as firewalls, WAF, IDS, IPS, and IDP. Although the functions of firewalls and other security devices of various vendors vary in the transparent mode, can they block different events and really resist them? I don't think so.

The principle of "cool and cover quilt" is that, just like building a house, are you building blocks of bricks? The brick room requires adhesive like cement to ensure structural stability of the house. Although there are now SOC platforms, the existing SOC platforms basically follow the ITIL-like route, processes, and ticket distribution. Where is the real adhesive?

Nowadays, the lack of adhesive is a problem. We can integrate more quilts seamlessly. It can provide some security protection functions. If it is a human body, the spine may be the key. We often forget the importance of spine. Security is similar, and basic things need to be well done. Instead of buying more quilts and covering more quilts, We need to thicken the cushions, that is, to give our security personnel enough space to think about and solve the security root.

My friends have always said that the key to file security, information security, and network security is that files and information are not stolen or transmitted intentionally or unintentionally. network security means that the network architecture is not damaged, the channel is not congested, and so on. Yes, can it be done? No one can guarantee it, but if we dynamically associate it and learn it, it may have a good effect. After the evaluation of domestic network information security in this phase, we will discuss how to compare several devices.

This article is from the "home. is" blog, please be sure to keep this source http://chiefkey.blog.51cto.com/26103/590689

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.