Keywordssecurity data security data security importance
Personal information refers to all kinds of information recorded by electronic or other means that can identify the identity of a specific natural person or reflect the activities of a specific natural person either alone or in combination with other information, such as name, date of birth, ID number, personal biometric identification information, address, communication contact information, communication record and content, account number and password, property information and credit investigation Information, trace, accommodation information, health and physiology information, transaction information, etc.
In recent years, personal information tampering and security incidents are common. There are certain risks in these personal information data, and some people will try to steal, tamper with and sell them for profit, such as the information tampering incident of Beijing Education Examination Institute, the leakage of educational status information, the "leaked CD" of pregnant women information in Shenzhen, the information disclosure of car owners and shareholders, the tampering of lottery winning information, and the "Rio Tinto gate" incident; from personal privacy to enterprises The trade secrets of the industry, even the core secrets of the government and the state, have different degrees of information security problems.
And these cases tell us: data security protection is very important. At present, most of the important data are stored by the database system, so the database security protection is particularly important.
With the legal basis, enterprises and institutions should strengthen the database system to protect its security. This is not only the need to prevent attacks and crimes, but also the embodiment of due diligence, which is the defense of the law.
So, how to protect database security more effectively and prevent information leakage and tampering?
The answer is: "no preparation means no preparation." prevention is far more effective than "fire fighting" afterwards.
First of all, it is necessary to strengthen the access control of database, make clear the division of responsibilities of database management and use, minimize the use rights of database account, and prevent abuse of rights; at the same time, it is necessary to strengthen password management, use high-strength password, delete the default account password of the system, etc;
Secondly, it is necessary to strengthen the security of the database and its core business system, protect the deployment of firewalls, IDS / IPS, anti-virus system at the system boundary, and timely carry out system patch detection and security reinforcement;
Finally, it is very important to carry out real-time security monitoring and post operational audit on the database system and its host, and deploy a set of data backup and recovery system, which is equivalent to the last defense line of database security.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.