I. Marginal Equipment Protection
The gateway is the only way to communicate with the Intranet and the throat of connecting the Internet to the Intranet. Relatively speaking, there are few Trojans and viruses in the Intranet, but there is a lack of isolation mechanisms in the Intranet. Once a computer is infected with viruses and Trojans, other viruses are in a very dangerous situation. Just like the flu, although it is easy to get the flu, if one of the family experiences it, other family members will be easily infected.
Therefore, for a local area network, there should be at least a router or firewall with the initial security protection function at the edge to establish the first line of defense.
Ii. Password Security
Most people now recognize the importance of password security, but we should reiterate that the number of passwords should be as long as possible; do not use a password that is easy to guess, such as a birthday, house number, or phone number, or use the same password on each system; it is best to use a mix of uppercase and lowercase letters and numbers and an irregular password as the password, and change the password of each system on a regular basis. In addition, it is best to separate the private password from the password used at work.
3. Terminal Computer Protection
In general, the protection software that must be installed on the terminal computer is anti-virus software. The basic requirement is to be able to protect the computer in real time, especially when it is on the Internet.) The database is updated fast and occupies a small amount of system resources. I personally strongly recommend kaspersky. The Russian technology and virus database are updated twice a day and promised to respond to the new virus for 30 minutes, which is convenient to use, there is also a Chinese version. The only disadvantage is that it is not made in China. It cannot be used to support national enterprises ).
The vast majority of operating systems should use Microsoft's windows series. The stability of the windows9x series is not too strong. Fortunately, it is not easy to crash after windows2000, and the stability of the operating system itself is still acceptable, the main impact is the installation of various plug-ins, such as XX real name, XX pig, XX21, XX assistant, and XX search, which are installed accidentally during software installation, it not only occupies a large amount of system resources and window space, but also affects the boot speed and sometimes causes unknown errors. If you want to uninstall it, search for it on google or baidu. There are still a lot of related information. In addition, system patches must be promptly installed.
Regular backup of important data is also very important. On the one hand, the price of hard disk data recovery is generally higher than the price of the purchased hard disk, and may not be restored; on the other hand, if the misoperation deletes important data, the importance of backup is reflected at this time.
For enterprises with dozens, hundreds, or more, adding domain controllers for management is a very effective method. Enterprises generally access the Internet through proxies or routes. Therefore, they can use the "Alibaba Cloud Security IPtrust Intranet security management system" to monitor the operation behavior of internal computers, he can monitor terminal operations, website browsing, and various real-time information software, and can also restrict or prohibit non-work software such as games, multimedia, and stock software, it can also filter websites to restrict pornographic, political, or other types of websites.
Iv. Physical protection
This refers to the security of various hardware devices and communication links such as PCs, routers, switches, and workstations, important equipment, such as the power supply of servers providing external services, natural disasters such as flood, fire, and lightning strikes, human damage and misoperations, and external electromagnetic interference, should be paid attention, physical security threats can directly cause Device Damage and data loss. To prevent such incidents, we need to establish and strictly enforce the data center management system. In the infrastructure phase, we need to do a good job of lightning protection for data centers and power supplies.
Summary
To better solve Intranet security problems, you need to look at Intranet security from various perspectives. In the current situation of rapid network development, security issues cannot only be stuck in the "blocking", "Killing", or "preventing" layer, but must be met in a dynamic manner, keep learning to keep up with the changes in new technologies. In addition to technical prevention, sound network security management systems, and establishment and improvement of various rules and regulations are also essential measures to ensure Intranet security.