People-oriented information security

Source: Internet
Author: User

Recently, the leakage of confidential files of the Japanese Navy "Chao Xue" Destroyer on the Internet has been stirred up. The whole process of leaks was even "disclosed" in Japan's cord-breaking news. Originally, Cao Chang, the telecommunications officer responsible for external liaison and communication affairs on the ship, violated management regulations and copied confidential data on the warship to his PC. When he downloaded music from his computer at home, it was attacked by viruses. All personal files were obtained by computer hackers and published to the Internet. Foreign experts pointed out that the leak had a great impact, and the intelligence authorities of various countries were able to deduce from these documents the real combat power of the ship. It is said that this is the largest Leak disaster in the history of the Japanese Defense Agency. Japanese Prime Minister Koizumi called it "this is a big event that has no trust in all the people ". The Japanese Self-Defense Force, which has always been disciplined and well-regulated, has experienced such a major leak. people are shocked and have thought a lot about its deep-seated causes. The fundamental problem lies in the weak security concepts and poor confidentiality awareness of classified personnel. Therefore, in the context of rapid development of information construction and increasingly extensive application of information systems, we must take good people's work as the first line of defense and the most critical link for information security and confidentiality. Strengthen Education and continuously improve information security awareness. In our work, we must overcome the wrong ideas and Vague understandings such as "focusing on construction, light protection" and "Information security has nothing to do with ourselves", and understand information security from the strategic perspective of National Defense Security, we should establish the concept that "security is to ensure combat effectiveness and victory". At the same time, we should combine security and confidentiality education with daily sex education to truly put security awareness and Security Concepts in our minds, it is embodied in action to prevent information security education from passing through and flowing in the form. Strengthen training to improve information security protection skills for classified personnel. According to relevant statistics, more than 70% of information security problems are caused by internal personnel factors. To this end, we should establish a comprehensive training system for classified personnel based on the confidentiality levels of personnel in different environments, formulate specialized training courses and syllabus, and update training content in a timely manner, enhance the independent protection capability of personnel to ensure that full-time and experienced information security management personnel are available in the main departments, key systems, and key links of the Information Network. Strict management to ensure that all information security management systems are implemented. "Information security is a three-point technology and seven-point management". Management is the soul of Information Security. Whether the management system can be implemented depends on people. If you do not pay attention to the implementation of the information security management system, developing and improving the system, building more firewalls, and researching advanced network security technologies will become the ears of the deaf. Therefore, we should not only work hard to establish an information security management system, but also work hard to implement the information security management system and deepen our understanding of the principles of information security management, continuously strengthen the implementation and implementation of information security management systems.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.