First, analyze the LAN security threats
The personage inside course of study thinks: The threat to the internal network of the unit mainly comes from not the unit outside, but the unit interior. Therefore, it is wrong to focus on preventing the network from being attacked from outside the unit, while neglecting the cyber security threats from inside the unit.
According to CISCO security department statistics, in fact about more than 70% of the safety accidents (especially loss of leakage dense) comes from within the unit. Therefore, due to lack of awareness of the internal network security threats, the unit security department did not properly take scientific precautionary measures, resulting in an increase in network security incidents from year to year. The reason that the unit within the network security risks in addition to the security system from the deployment flaws, the greater is from the unit's internal staff, its performance in:
(1) Disorderly management of removable storage media;
(2) using pirated software, games, etc., resulting in the spread of the virus;
(3) user and user group permissions allocation is unreasonable;
(4) account and password management does not meet the strict requirements or set unreasonable;
(5) Too many service ports
(6) network administrator is too large or professional level is not high enough, not a strong sense of responsibility;
(7) user operation errors, may damage network devices such as host hardware, accidentally deleted files and data, formatted hard disk error, etc;
(8) internal network attacks. Some employees, in order to vent their anger or counter-act as enemy spies, become unites of infringers or saboteurs. Because these employees are familiar with the internal network structure of the unit, they can exploit management loopholes and invade others' computers for destruction.
(9) Internal attacks from wireless network users. If the enterprise LAN deploys a wireless access point (AP), an ordinary AP with a wireless LAN device installed in the coverage area of the AP if it is not guarded against security measures such as authentication and portability Devices can automatically join the local wireless LAN network, this local LAN is very easy to encounter illegal attacks.
Second, the cloud computing cloud security technology
After the cloud computing industry emerged, "Cloud Security" emerged. 'Cloud Security' is an important area that appears in the development of cloud computing. It can not be neglected. 'Cloud Security' must be taken as a precondition for the development of cloud computing. For the cloud computing industry, cloud security should be highly valued. If Without the protection of 'cloud security', the development of our cloud computing will also make everyone lose their confidence.
So what is "cloud security"? Popular point that "cloud security" refers to the anti-virus vendors through the Internet, using the client to collect the virus code, through analysis, processing, processing, and finally given the solution to distribute to users , So that the entire Internet has become a huge anti-virus software to protect the user's computer security, you do not have to worry about upgrading and updating the virus software library every day.
Some people say that the advent of cloud computing technology indicates the advent of the PC era. As the software industry gradually evolves from the C / S architecture to the B / S architecture, the demand for the hard disk of the client must be smaller and smaller. For the client's intelligence The lower and lower requirements, our future personal PC will no longer need to install any software, without having to download any software installed on the PC, but directly through the browser or professional equipment for all applications remotely call, full Take advantage of cloud server resources to reduce local load, reduce TCO and fully personalize your PC.
So cloud security technology than ordinary security technology what are the advantages?
In general, cloud security uses a large number of servers in the cloud; cloud security does not take up the memory of each user's computer, and today's antivirus software consumes a large amount of memory on the client's computer. By using cloud security technology, if a client on the Internet receives a virus Of the attacks, cloud security by collecting the code of the virus, making other people online from this virus intrusion;
The use of cloud security, the virus was intercepted before the arrival of the virus, usually personal computer security technology is the virus after the antivirus software can eradicate, and even anti-virus software does not upgrade if not effective protection.
(Editor: left good)