43nike9485qt
ORANGE EKSTRAKLASA
Dołączył: 26 Paź 2010
Posty: 812
Przeczytał: 0 tematów
Ostrzeżeń: 0/5 Skąd: England
|
Wysłany: Śro 18:53, 05 Sty 2011 |
|
|
Nanchang Radio information platform construction of the security
To force the illegal users offline: issued a notification message, record authentication failure logs, tracking processes such as the Internet, you can use it easy and flexible way to network management to ensure the safe operation of the information platform. Second, the whole network linkage is virtually no security and defense never been infected by a computer virus, computer viruses have become the most important and most common network security problems, the general approach is to use a variety of most network security products, such as anti-virus software,[link widoczny dla zalogowanych], firewall, intrusion detection, etc., but these are still not completely against, including viruses, including various security threats. After a comparison of various anti-virus programs, we use the latest Huawei 3Com protection from passive to active defense (IPS) the transition of network security solutions EAD: Endpoint Admission Defense (End-pointAdmissionDefense). EAD is mainly used to solve the network access level security. Currently,[link widoczny dla zalogowanych], including 802.1x authentication and Windows domain user authentication at all levels, including the way can only have the relevant permissions to ensure that only authenticated users can access relevant resources, but can not guarantee that these users would not in itself malicious attacks and other acts , can not ensure that users are using PC platforms are not viruses or Trojan infection. Therefore, once the network is compromised a machine pC machine, it could cause the entire network in a short time a virus attack or infection. To this end, EAD is to start from the user terminal access control, integrated network access control and endpoint security products, through the security client, security policy servers, network equipment and the joint third-party software on the user terminal access network platform to enforce a spoon enterprise security policy to control the end user's network usage behavior. EAD system consists of four parts, including the client platform security, security linkage equipment, security policy servers,[link widoczny dla zalogowanych], and third-party server (that is, Kingsoft Internet Security Online and patch leak fixed server). Security platform is installed on the client PC, the software can integrate the security / anti virus / anti-spyware vendor's plug-in components, to achieve user authentication, security state assessment and implementation of network security policy. Security policy server is the EAD program management and control center used to implement user management, security policy management, security, condition assessment, linkage control, and security features such as security event auditing. Safety equipment is linked network security policy enforcement point play to force users to access certification, quarantine unauthorized terminals providing network services for legal services and so on. Drain move scanning to implement user security access. This ensures the user's safety, legality, real security to the edge of the overall security framework. Third, the development of safety management system only security technology and safety management system without strict matching, it is difficult to guarantee network security, so also must develop a comprehensive management system, safety technology and safety to regulate and management. Therefore, we developed different aspects of management systems and standards developed from the perspective of the global management of security management strategies; from a technical point of view of security management of configuration and management; from the perspective of personnel management to achieve a unified strategy by user role, to develop a series of management practices. Also asked the network administrator regularly organize technical documentation and make data backup, improve their technical level, to reduce dependence on vendors: to strengthen communication between the industry, exploration and development of effective management, maintenance strategy: to keep abreast of security defects causes and find solutions to problems, to ensure the safe operation of the system. Nanchang Radio Centre building with the completion of the new use of this information platform for running too close to a year, etc.) bring up, EAD Strategy Center, the state will be user-centric policy and strategy compared to when the user's status and strategies that Centre has developed a strategy does not match the user is not allowed access to the network which, and the user VLAN isolation to a public system which force users to upgrade, after upgrade only when the user-centric policy compliance strategies can be normal when Internet, through the automatic software upgrades and the development of uniform time isolated off-line inspection, antivirus, as well as the LAN I ~ AI) strategy system map has been carried out in the main business of office automation systems, Nanchang, four television stations, channel presentation system remote video transmission systems,[link widoczny dla zalogowanych], television post-production equipment, management systems and intelligent building management systems, etc., the whole system running safely and steadily, various business development success. With the continuous development of broadcasting in Nanchang, the information platform will be constantly improved and are playing an increasingly important role. ◆ (Author: Nam Cheong station J part Zebian: Xiao months
More articles related to topics:
tory burch outlet Vocational training and employme
abercrombie fitch outlet 小型水电站取水枢纽冲沙闸
tory burch outlet 文章不存在java.io.FileNotFoundEx
Post został pochwalony 0 razy
|
|