Remote, Mobile user connection Network Ten Basic Laws

Source: Internet
Author: User
Tags web services

With more and more remote users and more mobile users, the need for process access programs and network resources is increasing, which brings security challenges to the management of such users. This connection is a shock to network protection, but also brings financial risk to the enterprise, if the network is affected by next generation red code or Nimda virus, what kind of loss will suffer. The following 10 rules are effective for effectively managing the security of mobile users:

1. Scanning: Users with broadband Internet access (DSL, home cable, or WLAN) may be scanned, packet-filtered PC firewalls can reduce this risk and can be used in conjunction with the network's existing security tools.

2, worms and viruses: Anti-Virus software can not be abused, for static desktop users, the installation of mail detection is enough. But for mobile users, access to Web-mode mail, while the new risk, if not installed anti-virus software, once also the enterprise network connection may spread the virus.

3, Lost notebook computer: If the data in the notebook computer is valuable, consider disk encryption or tracking software, in addition, in order to prevent the notebook computer can deceive network certification, consider strengthening the authentication method. It is easy to use hacker tools to get the username and password of a laptop, to prevent thieves from connecting to the network, to consider encrypting network connections, and to ensure that the VPN user is authenticated rather than machine authenticated.

4, Sleeping Trojan, at any time will be asked to wake up, and to turn the laptop into a denial-of-service attack tool, so that enterprises exposed to potential dangers. Firewalls can block a number of Trojans by blocking the corresponding ports.

5, an VPN:VPN/gateway to provide two security, the transmission of encrypted data, authenticated connected users and machines, but unfortunately this makes notebook more become one of the goals of the network, so the division of transmission channels, improve user authentication, strictly prohibited abuse.

6, multiple environment/multiple strategies: in the security policy needs to consider the environment of mobile users, through the cooperative ISP or its own ISP users can VPN direct access to the network, so the user's location and access to the way to have strict standards.

7. Operating system: Adopt a standard and insist, configure a strong Win2000, turn off personal web services and other unnecessary services, and hit all the needed bites

8, User Management security: Users can not manage their own security, if the security incident warning, they may seek help, can also turn off security programs, enterprise-class tools to allow transparent security for ordinary users, and the policy definition to the network experts.

9, simple strategy: The biggest security problem is to configure the wrong strategy, from the security tools to obtain the best results, choose a common approach and familiar structure, often upgrade and check security measures.

10, warning or not warning: Consider the security issues when the support and response, if the scan how to deal with, the data is the matter is worth collecting? The invisible costs are included in the control by collecting monitoring data. The best approach may be to apply stand-alone tools, anti-virus software can isolate worms, firewalls automatically shield problematic ports, and provide 24 * 7-hour monitoring and analysis.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.