Current location - Education and Training Encyclopedia - Education and training - How to Strengthen Network Information Security
How to Strengthen Network Information Security
Question 1: How to strengthen the standardization of network and information security?

Dong zhenguo

Information security construction is an indispensable part of e-government construction. E-government information system carries a large number of data and information related to national political security, economic security, national defense security and social stability; Network and information security are not only related to the healthy development of e-government, but also have become an important part of the national security system. E-government information system without security can't realize real e-government.

First, strengthening security awareness and attaching great importance to information security are prerequisites for ensuring the safe operation of government network information systems.

At present, most e-government information systems adopt open operating systems and network protocols, which have inherent security risks. Network attack, hacker invasion, virus flooding, system failure, natural disasters, network theft and illegal operation by insiders all pose a great threat to the security of e-government. Therefore, information security is a long-term task related to the overall situation of national economy and social informatization.

We should conscientiously implement the spirit of "focusing on e-government construction and focusing on network and information security" and the general requirements of Document No.27 [2003] of our Office, fully understand the importance and urgency of strengthening the construction of information security system, and attach great importance to network and information security work. This is a prerequisite for information security. "attaching great importance" must first be paid attention to by leaders; Only when leaders attach importance to it can information security work be put on the agenda and placed in an important position, and many problems faced by information security work can be solved in time. Secondly, by strengthening the popularization of network security education, especially the training of network security knowledge for cadres at or above the county level, the awareness of security and confidentiality of civil servants will be strengthened, so that the publicity and education of network information security will not leave a dead end and create conditions for the safe operation of network information systems.

Two, strengthen the legal system construction, establish perfect system norms, is an important basis for information security.

To ensure the security of government network information, we must strengthen the construction of legal system and standardization of information security, and act in strict accordance with rules and regulations and work norms. As the saying goes, there is no Fiona Fang without rules, especially in information security. If we can persist in establishing legal systems and standards, improve systems and norms, and implement them well, we will minimize unsafe factors and errors, and make the government information security work continuously step up to a new level.

Therefore, first of all, we should strictly follow the existing laws and regulations to regulate network behavior, maintain network order, and gradually establish and improve the legal system of information security. Strengthen the standardization of information security, pay close attention to the formulation of much-needed information security and technical standards, and form an information security standard system with China characteristics that is in line with international standards.

Second, we must establish and improve various rules and regulations and daily work norms. According to the new situation and new problems faced by network and information security, we should closely contact the actual information security work of our unit, adhere to the principle of "blocking, supplementing and using", and promptly revise, improve and construct new rules and regulations and operating procedures for information security, effectively enhance the scientific, useful and operability of the system, and make information security work evidence-based and rule-based.

Third, we should pay attention to the implementation of safety standards and rules and regulations. With the system, it can't be shelved. Failure to act according to the system is an important cause of work mistakes and potential safety hazards. Many unsafe factors and work loopholes are caused by not following the procedures. Therefore, it is necessary to organize information workers to study relevant systems and norms repeatedly, so that they can be familiar with and master the basic contents of each system, understand the rules and methods of information security work, and consciously use the system to restrain themselves and standardize their work.

Fourth, establish and improve the supervision, inspection and incentive mechanism of system implementation. After the establishment of working procedures and rules and regulations, they must be followed and implemented in every item and paragraph of the rules and regulations. The implementation of the system mainly depends on consciousness, but there must be strict supervision and inspection. It is necessary to establish an incentive mechanism for information security work through supervision and inspection, closely combine information security work with the annual assessment and the work of "striving for Excellence", encourage the advanced and spur the backward to ensure that all information security work systems are implemented. All localities and departments shall conduct self-examination and self-correction on the implementation of this system from time to time, find problems and solve them as soon as possible.

Three, the establishment of information security organization system, the implementation of safety management responsibility system, is the key to do a good job in government information security.

Investigation shows that in practice ..... >; & gt

Question 2: How to improve the ability of network information security? Sound network and information security measures With the popularization of enterprise networks and the expansion of network openness, sharing and interconnection, people pay more and more attention to network information security. A secure computer network should have reliability, availability, integrity, confidentiality and authenticity. Computer network should not only protect the security of computer network equipment and computer network system, but also protect data security. Network security risk analysis The vulnerabilities of computer system and communication facilities are isomorphic, which pose a potential threat to computer network. Information networking makes information open and information utilization free, which leads to the sharing and interaction of information resources. Anyone can publish and obtain information online. In this way, the problem of network information security has become the core problem that harms the development of the network, and the information infringement caused by the connection between the Internet and the outside world is particularly serious. At present, the unsafe factors of enterprise network information come from viruses, hackers, Trojans, spam and so on. Computer virus is a destructive program that endangers the security of computer system and network. It can directly destroy computer data and information, and also occupy a lot of disk space, seize system resources, thus interfering with the normal operation of the system. With the development of Internet technology, the maturity of enterprise network environment and the increase of enterprise network application, the ability and mode of virus infection and transmission have changed from simple to complex and hidden, especially the Internet environment and enterprise network environment provide an environment for virus transmission and survival. Hacking attacks have become frequent events in recent years, and the incidents of server attacks in the network are endless. Hackers use the loopholes and defects in computer systems, network protocols and databases to invade computer systems by means of password cracking, trap doors, back doors, Trojan horses, etc., destroying information or occupying system resources, so that users cannot use their own machines. Generally, the networks of large enterprises have Internet connection and provide services such as WWW and email. Therefore, the internal network of an enterprise connects with the outside through the Internet and exchanges a lot of information, of which about 80% of the information is e-mail, and more than half of the e-mail is spam, and it is still increasing year by year. Information security in enterprise LAN can not be ignored. Nodes in the network share network resources through the network * * *, and may inadvertently store important confidential information or personal privacy information in the * * * shared directory, thus causing information leakage; There is even a phenomenon that internal personnel write programs to spread through the network or use hacker programs to invade other people's hosts. Therefore, network security should not only guard against external networks, but also guard against internal networks. Network security measures Therefore, there are many network security risks to consider. Therefore, enterprises must adopt a unified security strategy to ensure network security. Complete security technologies and products include: identity authentication, access control, traffic monitoring, network encryption technology, firewall, intrusion detection, antivirus, vulnerability scanning, etc. The causes of safety accidents include technical factors, management factors and omissions in the design of safety architecture. 1. Measures to prevent external intrusion (1) Network encryption (Ipsec) IP layer is the most critical layer in TCP/IP network. As a network layer protocol, the security mechanism of IP can provide transparent coverage security protection for various application services in its upper layer. Therefore, IP security is the basis of the whole TCP/IP security and the core of network security. IPSec is the only protocol that can provide security for any form of Internet communication. IPSec can provide security through data flow or connection, so it can achieve very detailed security control. For users, different levels of security protection can be defined according to different requirements (that is, IPSec channels with different protection strengths). IPSec provides security services for network data transmission, such as data confidentiality, data integrity, data source authentication and replay prevention. , so that when data is transmitted through the public network, there is no need to worry about being monitored, tampered with and forged. IPSec achieves these goals by using various encryption algorithms, authentication algorithms, encapsulation protocols and some special security protection mechanisms. These algorithms and their parameters are stored in SA (secur >: >;

Question 3: How to strengthen network security If you are an individual user, choose good antivirus software, and don't receive or open message links sent by strangers at ordinary times.

Do it. If this is a big arc and you are controlling it,

Make full use of commands such as port security and mac binding of the switch,

After setting ACL and NAT.

It should be very safe.

Question 4: How to strengthen personal information security and self-protection is the first important link of network privacy protection. Netizens have many ways to protect their online privacy.

The first is to isolate personal information from the Internet. When there is important information in a computer, the safest way is to disconnect the computer from other computers connected to the Internet. This can effectively avoid the invasion of personal data privacy and the economic loss caused by database deletion and modification. In other words, it is best not to store important personal information in the computer that netizens use to surf the Internet. This is also a common practice in many units at present. The second is to use encryption technology when transmitting files involving personal information. In computer communication, information is hidden by cryptographic technology, and then the hidden information is transmitted, so that the information is stolen or intercepted in the transmission process, and the thief cannot know the content of the information. The sender uses the encryption key to encrypt the information through encryption equipment or algorithm and send it out. After receiving the ciphertext, the receiver uses the decryption key to decrypt the ciphertext and restore it to plaintext. If someone steals it in transmission, they can only get incomprehensible ciphertext, thus ensuring the security of information transmission.

Third, don't leave personal information on the Internet easily. Netizens should be very careful to protect their information, and don't casually disclose personal information including email addresses online. Now, some websites require netizens to get some "membership" services by logging in, and some websites encourage netizens to leave personal information by giving gifts. Netizens should pay great attention to this. Just because a form or application needs to fill in personal information doesn't mean that you should disclose it automatically. If you like, you can turn passivity into initiative and use some false information to deal with the excessive demand for personal information. When required to input data, you can simply change the letters of your name, postal code and social security number, which will associate the input information with a false identity, thus * * * introducing data mining and feature testing technology. Be more careful about personal information that uniquely identifies the identity class, and don't disclose it easily. This information can only be used for online banking, passport reapplication or dealing with trusted companies and institutions. Even if you must leave personal information, you must first determine whether there are policies and measures to protect the privacy and safety of netizens on the website.

The fourth is to install a firewall in the computer system. Firewall is a way to ensure network security. Firewall can be installed on a separate router to filter unwanted packets, or it can be installed on the router and the host. In terms of protecting network privacy, firewall mainly plays the role of protecting personal data security and personal cyberspace from illegal invasion and attack.

The fifth is to use software to counter Cookie and completely delete files. As mentioned above, the website that establishes Cookie information can read the personal information of netizens with the help of the browser, track and collect the online habits of netizens, which poses a threat and violation of personal privacy. Netizens can take some software technologies to counter Cookie software. In addition, because some websites will send some unnecessary information to the computers of network users, netizens can also protect their network privacy by clearing the data temporarily stored in memory after surfing the internet every time.

Sixth, the protection of minors' network privacy should be carried out with the help of parents or guardians and related software technologies, in addition to educating minors on privacy knowledge and media literacy.

Question 5: How to do a good job in network security information security can be done as follows:

1. Information system boundary

Information system boundary is the boundary area between enterprise information system and external data, and it is the first barrier to ensure data security. In order to ensure the data security of the information system boundary, the following security devices and measures need to be deployed: First, an efficient and safe firewall device is set on the network side to filter the two-way traffic passing through the boundary through access policies and blocking policies to prevent unidentified hackers from accessing the information system. The second is to deploy advanced IPS active anti-attack equipment. By configuring common network attack matching packages, two-way traffic can be detected at the application layer, which can effectively reduce the attack risk of viruses, worms and Trojans. Third, mainstream flow control equipment should be equipped to protect the normal use of the border exit bandwidth by checking the abnormal flow. The fourth is to deploy border equipment audit system and log analysis system, regularly collect operation logs and operation logs of network equipment and security equipment, and issue log reports. Through the analysis of log reports, information security managers can evaluate the attacks suffered by information systems, the effectiveness of network boundary rules and the running state of equipment, so as to make corresponding security plans for the next work.

2. Desktop Terminal Domain

Desktop terminal domain is composed of employee desktop work terminals, which is a hotbed of confidential information security incidents. Desktop terminal domain security protection is the second barrier of security defense, which mainly includes the following three aspects:

The first is the security of the desktop terminal operating system. Most of the company's personal computers use Microsoft's Windows XP or Windows Vista. In response to hacker attacks, Microsoft will regularly release system security patches. A set of Microsoft WSUS patch server should be deployed in the information intranet and intranet, and operating system security patches should be downloaded regularly.

The second is the system anti-virus strategy. Computer virus is the chief culprit of computer system paralysis. The anti-virus strategy is realized by anti-virus servers deployed in the information intranet and extranet. Anti-virus servers are deployed in the information intranet and the information intranet respectively, anti-virus clients are installed in PC devices in the information intranet and the information intranet, and the anti-virus database is automatically updated from the anti-virus servers regularly.

The third is the security of mobile storage media. Mobile phone media without effective protection is an effective carrier for spreading viruses, and it is also the chief culprit for leaking company secrets and state secrets. The company should deploy a secure mobile storage system to encrypt the USB flash drive. All employees use secure USB flash drives to avoid the risk of moving media.

3. Application system domain

The application system domain consists of a server running enterprise application system and a database storing enterprise application data. Application system domain security protection is the third barrier of security defense. Firewall devices need to be deployed between application system domains and system boundaries, between desktop terminals, and between application system domains with different security protection levels. Application system maintainers need to carefully count the application of the system, provide detailed port applications, and formulate feasible access and blocking strategies.

Question 6: How to ensure the security of network information?

1 to ensure hardware security.

Common hardware security measures mainly include the use of UPS power supply to ensure that the network can run under continuous voltage; Lightning protection, waterproof, fire prevention, anti-theft, anti-electromagnetic interference and safety protection of storage media.

2. Ensure system security

Install antivirus software and update system patches in time. Turn off unnecessary services and permissions as much as possible. For foreign storage media, the virus must be killed before use.

3, defense system and backup recovery system

Firewall can be used to realize security functions such as access control, identity authentication and access audit between different areas. Intrusion detection system (IPS) is a reasonable supplement to firewall, which can help the system to deal with network attacks and improve the integrity of information security infrastructure.

4, security audit and system operation and maintenance

Monitoring network content and authorized normal internal network access behavior can help us understand the situation of clients and servers in the network, abnormal processes and hardware changes, and the repair of system vulnerabilities and patches.

5, personnel management and system security

Strengthening the safety awareness of computer personnel, improving their safety quality, sound rules and regulations and an effective and easy-to-operate network security management platform are important conditions for doing a good job in network security.

Question 7: How to enhance college students' awareness of network security With the rapid development of the Internet, the problem of network security has become increasingly prominent. In the network security problem, the human factor is the first. The European Network and Information Security Agency pointed out in "Improving Information Security Awareness": "In all information security system frameworks, human factors are often the weakest link. Only by innovating people's outdated security concepts and cognitive culture can we truly reduce the possible hidden dangers of information security. " College students are the new force for the future development of the country, and their awareness of network security is the first line of defense for network security. Strengthening college students' awareness of network security is directly related to the future of the country, and it is urgent to enhance college students' awareness of network security.

First, college students' awareness of network security is weak.

College students are the main force in the contemporary online shopping market. Most of them have online shopping experience. Because of their lack of social experience, simple thinking and limited recognition ability, they are often victims of online shopping because they do not fully grasp the real implementation of online information. Not only that, the network is easy to reveal personal privacy, including some social networking sites that require the recorder to provide personal information such as real name and telephone number, which can be easily used by businesses, and publishing some advertisements in the form of e-mail will interfere with students' normal study. However, college students can't grasp the privacy of their own information and think that filling in some data will not affect their lives.

Second, the main reason for college students' weak awareness of network security

There are many reasons for college students' weak awareness of network security, including the whole network environment, the absence of school education and the problems of college students' own network quality. (A) network insecurity is relatively hidden.

The concealment of network insecurity deceives college students. At present, many students' QQ numbers and online banking accounts have been stolen, but many students think that no one is trying to steal their data. So they take it for granted that network security is not something that ordinary college students should pay attention to. Cybercriminals are only interested in sensitive information such as highly confidential and valuable data and bank accounts, and are not interested in ordinary college students because they have nothing of value. In fact, network security not only refers to network information security, but also includes network equipment security and network software security. Due to technical reasons, there are security loopholes in the current computer operating system. Intruders can use various tools to invade other people's computers, steal other people's information, or borrow other people's computers to carry out malicious attacks on the network. Therefore, the problem of network security is not only the disclosure of personal privacy, but also the trouble of frequently reloading the system, which may lead to economic losses, and may even make itself a scapegoat for criminals and fall into legal disputes. (2) The lack of network security education in schools. The current situation of college students' lack of network security knowledge and weak awareness of network law and morality is related to the lack of network security education in schools.

1. College students lack knowledge of network security. College students generally know the commonly used terms in network security, such as firewall, virus, Trojan horse, etc. 74% of them know that they should install a firewall on their computers and upgrade their anti-virus tools regularly. However, 83.6% of the students think that as long as there is a firewall, anti-virus software and other network security tools, they can ensure their own safety, but they don't know that bad online habits, improper use of network security tools, and loopholes in the system itself are all factors that endanger network security. The reason for the above phenomenon is that college students' network security knowledge generally comes from peers or networks around them, and is rarely obtained through school education. At present, public computer courses are generally offered in colleges and universities, but the network security education of this course is seriously lagging behind, and it is impossible to impart network security knowledge to students in time.

The lack of network security knowledge makes college students walk on the edge of network danger unconsciously. With online fraud and other criminals

With the emergence and rise of crime, some college students begin to realize the existence of network security problems. However, due to their lack of relevant knowledge and poor network skills, although they are very concerned about their own network security, they often can't find the endless theft and sabotage on the network, and even if they do, they can't help it. 2. College students' network legal knowledge is blank and their network moral concepts are vague. At present, colleges and universities generally don't offer special courses on network security legal education, and college students are not clear about network security laws and regulations, and the concept of network morality is also vague. Participate in the network ... >>

Question 8: How to improve the legal system of Internet information security 1. Systematic planning of network information security legislation

In order to promote the active and orderly development of the basic work of network information security legislation, it is necessary to systematically plan the network information security legislation first, which is also one of the key measures to effectively improve the legislative level. When formulating the systematic planning of legislation, it is necessary to scientifically integrate the requirements of legislation and promote the coordination between legislation, thus enhancing the predictability and scientificity of legislation.

First of all, the purpose of legislation is to promote development. It should be clear that legislation is to better provide normative basis and services for development and ensure the smooth progress of development. For the part involving network, we can put it within the scope of traditional laws, and try our best to solve practical problems by modifying or perfecting traditional laws. If some problems must be solved by making new laws, it is not too late for us to make new laws now. And the new law must have good openness and be able to deal with new problems at any time.

Second, we should pay attention to the use of moderate intervention. In order to adapt the law to the actual needs of society, we should actively change those backward adjustment methods, shift the focus of improving the legal system of network information security to serving the construction and perfection of network information, and strive to clear the obstacles for the safe development of network information, so as to standardize and ensure development, ensure and promote development, build a good social environment to promote the healthy development of network information in China, and form a cultural environment ruled by law that is highly consistent with the actual needs of network information security.

Third, we should fully consider some basic principles that legislation should follow. In the specific process of legislation, we should not only consider the consequences of negative law, but also fully consider the legal consequences attached to positive law. Therefore, it is necessary to formulate not only a management legal system, but also a legal system that can promote the sustainable development of network information industry and network information security technology, and involves some necessary contents that can actively promote the sustainable development of China's network information security industry.

Second, the specific measures to improve China's network information security legal system

(A) timely update the legislative concept of China's network information.

At present, some developing countries and most developed countries are actively participating in the formulation of international rules for network informatization, especially the legislation of e-commerce. These countries have the highest enthusiasm for participation. The European Union, the United States and Japan are all trying their best to develop their own draft legislation into a model of global network information legislation. Other countries are also strengthening their efforts to fight for the right to speak in legislation, and the unified introduction of international e-commerce rules is just around the corner. In view of this tense and urgent international situation, China should appropriately promote the actual development process of network informatization in China, update the legislative concept of network information in China in time, bravely absorb the advanced legislative experience of developed countries, speed up the legislative construction of network information security, and improve the domestic network informatization legislation as soon as possible. At the same time, China should actively strive for more say in formulating international network information rules, and earnestly safeguard the interests of China.

(B) to strengthen the study of China's network information legislation theory

Up to now, a considerable number of people in China have been engaged in the theoretical research work of network informatization, and have achieved remarkable research results, laying the necessary theoretical foundation for perfecting the legal system of network information security in China. However, these studies have no necessary organization and coordination, and the intensity and depth are far from enough. So far, no actual draft law has been worked out, which can't meet the needs of legislation at all. In order to cooperate with the perfection of the legal system, we need to make a more systematic and in-depth study of the legislative theory. Specifically, two main tasks should be done: First, it is suggested that some relevant domestic departments set up special academic seminars nationwide to study the legal policies of network information security, set off a wave of legislative theory research in China, and actively promote the realization of network information legislation. Second, actively study foreign network information legislation, learn from its advanced legal system and experience, and handle the relationship between network information security legislation and other laws.

(3) Actively transplant foreign advanced network information laws and regulations.

Compared with China, some western developed countries studied and practiced the legislation of network information earlier, and formulated many legal systems to protect the security of network information. Some developed countries even built a perfect legal system of network information security. Therefore, we should pay more attention to the new foreign-related information legislation ... >>

Question 9: How to effectively solve the problem of network information security? First, put forward a strategic vision in China as soon as possible. China's network security plan has been fully studied and analyzed. The internal and external threats to the interests in the information field are analyzed. Combining with my situation, making a plan can comprehensively strengthen China's network security protection system in political, military, economic, cultural and social fields, and invest enough funds to strengthen the information security protection of key infrastructure. Second, establish an effective information security management system, change the original reasonable situation of function matching, overlapping, crossing and conflict, and improve the efficiency of management functions * * * Third, accelerate the change of relevant laws and regulations in Taiwan Province. At present, some relevant laws and regulations are too general and lack operability. The law clearly stipulates the rights and obligations of various information subjects. Fourth, the research and development of information technology, especially the key products of information security, provides an overall and advanced development goal. Relevant industrial policies ensure the orderly development of information security products in the information technology industry. 5. Strengthen the construction of China's information security infrastructure, and establish a fully functional and globally coordinated security technology platform (including China Response, PKI and other systems) to support each other with the information security management system.

Question 10: How to realize information security? I think it should be understood from three angles: netizens, enterprises and countries.

Netizens and enterprises:

Weak security awareness: The weak awareness of network security of netizens and enterprises is an important reason why information security is constantly threatened. At present, although netizens and enterprises have certain knowledge of network security, they have failed to effectively translate it into security awareness, let alone implement it in network behavior. We seldom plan ahead, and it is often not until the network security accidents happen, causing huge property losses, that we will think of implementing and installing these security protection systems for network security management.

2. Countries:

(1) Incomplete network legislation: China's legislation in the network society is not perfect and the level is not high. Some experts pointed out that China has not yet formed a mature legal principle of network society, and network laws still follow or apply the legal logic of the physical world. In terms of information security legislation, there is a lack of unified legislative planning, and the existing legislative level is low, mainly based on departmental regulations. Legislation lacks sufficient coordination and commonality, and is not systematic and comprehensive. (2) Lack of core technology

China widely uses American operating system, whether on PC or mobile phone. China was monopolized by Microsoft in the PC era and copied by another American giant Google in the mobile Internet era. Since the operating system has the lowest and core authority, if the United States intends to use its advantage in the operating system to steal China information, it is like taking something out of its pocket.

So only a three-pronged approach can do a good job of information security!

(1) First of all, we should use the media and education to raise the awareness of cyber security prevention of netizens, and then the state should speed up the improvement of China's cyber legislation system. Fortunately, in order to ensure the national security and controllability of the core system, the National Network Information Office issued a network equipment security review system, stipulating that key application departments should purchase and use products that have passed the security review.

(2) However, as the main victims of cyber attacks, we should not only rely on the network security review system, but also fundamentally improve our network security self-protection ability and replace imported products with self-controlled domestic software and hardware and services. Because of the national conditions, it is impossible to independently develop and promote core hardware equipment and operating system software such as high-end servers on a large scale at one time.

(3) So now some enterprises and institutions and * * * units have begun to deploy large-scale domestic information network security management equipment, such as UniNAC network access control, data leakage prevention and other network security management monitoring systems. Through this management system, the security status of each terminal can be achieved, the access behavior and dissemination of important sensitive data can be effectively monitored, the events violating the security policy can be found in time, and the security events can be alarmed, recorded and analyzed in real time, so as to accurately grasp the security status of the network system. Ensure the security of our network.