The solution consists of the security technical part and the security management part.
Security Technology:
1. Physical Security
An independent computer room must be built to meet the requirements of waterproofing, fire prevention, and anti-static. Access Control and video monitoring are set for the data center.
2. Network Security
Firewall is used to divide security areas and divide the company's network into server areas and office areas. Set different security rules to prevent hacker attacks. Online behavior management products are used to control network behavior and traffic.
3. System Security
The terminal security management system is used to control clients, focusing on network behavior, patch upgrades, and software distribution. Reinforce the security of the server to ensure the security of the server.
4. Application Security
Scan and reinforce Web E-commerce servers to prevent SQL injection and other application attacks. If necessary, use a web protection system (Web firewall and tamper-proofing ). Audits database operations.
5. Data Security
Regularly back up databases and key systems and take emergency measures.
Security Management
First, we need to establish a cybersecurity responsibility system, which is headed by the company's main leaders. Establishes Data room security management systems, server security O & M systems, and computer terminal security usage specifications. Signs network security agreements with employees to provide employees' awareness of network security.
This article from the "reverse boat do not enter the back-min less" blog, please be sure to keep this source http://minshao.blog.51cto.com/2152239/1432865