Providing level-4 authentication and three-dimensional Control for Intranet security is the way out

Source: Internet
Author: User

Bkjia.com integrated message: at present, network boundary security protection cannot effectively protect network security. Only border security and Intranet Security Management three-dimensional control is the way out.

Intranet security focuses on internal network users, application environments, application environment boundaries, and Intranet Communication Security that cause information security threats. How to build a unified security control system and implement three-dimensional real-time supervision has become a challenge for network administrators.

Intranet security is more than just the stack of security products. At present, Intranet security has been deployed by simple security products, and has risen to the level of how to implement a credible and controllable three-dimensional protection system. The four-level trusted authentication mechanism ensures a win-win situation between security and management.

Level 1 Certification: hardware-level security protection and access control. Physical security reinforcement is implemented at the bottom layer of the computer terminal. the BIOS-level logon authentication and full-disk data protection are implemented using security cards. This prevents unauthorized users from starting from the disc and bypassing the protection software to steal data, at the same time, users cannot install operating systems or uninstall software at will.

Level 2 authentication: operating system-based identity authentication and file protection. The USB-KEY-based two-factor authentication technology is used to achieve trusted and controllable login of the operating system-that is, after the computer hardware is started, user permissions can be restricted. In addition, if a system disaster occurs on the computer terminal, appropriate system backup and disaster recovery measures must be taken.

Level 3 authentication: Implement Authorization Control for program installation and operation. Black/white list control of applications: Only programs signed and authorized by the administrator can run and use on a single terminal to further regulate the use of software programs of end users.

Level 4 Certification: Implements authentication management for trusted computers to access the Intranet. Security and control of network boundaries is a basic problem of Intranet security. Through the trusted terminal authentication subsystem based on 802.1X authentication protocol, the network can be securely connected.

After a level-4 trusted authentication mechanism is established, some basic protection requirements for identity authentication, media management, data protection, and security audit are also required. Finally, real-time monitoring is required.

  1. How terminal auditing can better serve Intranet Security (figure)
  2. Chinasec's intrinsic Intranet security market advances to the petrochemical energy field
  3. Expert discussion on Intranet Security Technology Analysis and standards

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.