Summary is a written material that comprehensively and systematically summarizes the achievements, existing problems, experiences and lessons gained in a period of time. It can make clear the next work direction, avoid detours and mistakes, and improve work efficiency. Let's take time to write a summary together. The following is the summary report of network security self-inspection in 2022 10 model essay compiled by me. Welcome to read!
Article 1 of the 2022 Model Report on Network Security Self-inspection According to the spirit of the document Notice of the General Office of the State Administration of Radio, Film and Television, the State Council, on Launching a Major Inspection on Network and Information Security in Key Areas, under the unified deployment of Qingdao Wenguang New Bureau, our station conducted a self-inspection on the network and information security of our station. The report is as follows:
I. Organization and development of information security self-inspection.
1, the information security inspection action group was established. The director is the team leader, the leader in charge is the deputy team leader, and the person in charge of relevant departments is the action group of the team members, responsible for the overall command, investigation, reporting, filing and storage of important information systems in Taiwan.
2. The information security inspection team inspected and confirmed the actual situation of the network and information system item by item, and comprehensively inspected and analyzed the self-inspection results, which improved the control of the network and information security situation of the whole station.
Two. Information security work
1, August 6, completed the deployment of information system self-inspection, and studied and formulated the implementation plan of self-inspection. According to business requirements and network boundary security, the hard disk broadcasting system, nonlinear editing system and cable TV transmission system are comprehensively combed and analyzed.
2. On August 7th, the hard disk broadcasting system, nonlinear editing system and cable TV transmission system were carefully inspected.
(1) Basic information of system safety self-inspection.
The hard disk broadcasting system is a real-time system, which has a great influence on the main business. Currently, there are 5 Dell servers, 2 HP servers and 2 Cisco switches. The operating system is windows and the database is SQLServer. Disaster tolerance is data level, and the system is not networked.
Nonlinear editing system is a non-real-time system, which has great influence on the main business. At present, there are 6 Dell servers and 6 Huawei switches 1 set. The gateway adopts UNIX operating system and the database adopts SQLServer. The case of disaster recovery is data disaster recovery. The system is not connected to the network, and the default rules are adopted in the security protection strategy.
_ _ CATV transmission system is a real-time system, which has great influence on the main business. Disaster tolerance is data disaster tolerance, and the system is not networked.
(2), safety management self-inspection.
In personnel management, full-time information security officers are appointed, and information security management institutions and information security full-time working institutions are established. All personnel in important positions have signed security and confidentiality agreements, and formulated safety regulations for personnel leaving their posts and approval forms for entry and exit of foreign personnel.
In the aspect of asset management, a special person is appointed to manage assets, the asset management system, equipment maintenance and scrapping management system are improved, and the equipment maintenance record table is established.
In the aspect of storage media management, the storage media management system has been improved and the storage media management record table has been established.
(3), network and information security training
The information security training plan of _ _ _ city radio and television station was formulated, and two information security education trainings were organized in the first half of 20 _ _, and 40 people received information security training, accounting for 20% of Taiwan units. Organize information security management and technical personnel to participate in professional training for 4 times.
2022 Network Security Self-inspection Summary Report Model Article 2 According to the Notice on Forwarding (District Zi Xuan [20 _] No.23), the Party Committee and government of Chunshu Town attached great importance to it and quickly carried out inspection work. The inspection summary report is as follows:
First, set up a leading group
In order to further strengthen the security management of network information system, our town has set up a leading group for network information work, with the mayor as the leader and the deputy secretary in charge as the deputy leader, and an office under it to ensure the smooth implementation of network information security.
Second, the status quo of network security
At present, there are 32 computers in our town, all of which use firewalls to protect the network and install anti-virus software to prevent and control viruses throughout the town.
Third, network security management measures
In order to do a good job in information construction and standardize government information management, our town has specially formulated a number of systems, such as Chunshu Town Network Security Management System, Chunshu Town Network Information Security Protection Work Plan, Chunshu Town Virus Detection and Network Security Vulnerability Detection System, which provide information management, internal computer security management, computer and network equipment management, data and information security management, network security management, computer operator management and website content management.
For computer _ _ _ _ _ _ _, our town has formulated relevant systems such as "Chunshu Town Information Release Audit Registration System" and "Chunshu Town Emergency Plan for Sudden Information Network Events", and regularly collated all the information on the website, and found no information involving security and confidentiality; Sign the "Responsibility Letter for Network Information Security Management in Chunshu Town" with the members of the network security team to ensure that "whoever uses the computer is responsible"; Strictly regulate and manage the data information generated by the intranet in our town, and file it in time; In addition, organize relevant computer security technology training in the whole town, carry out targeted "network information security" education and drills, actively participate in other computer security technology training, improve network maintenance and security protection skills and awareness, and effectively ensure the normal operation of the government information network in our town.
Fourth, the lack of network security and corrective measures
At present, there are still the following deficiencies in the network security of our town:
First, the security awareness is weak;
Second, the virus monitoring ability needs to be improved;
Third, the use and management of mobile storage media is not standardized;
Fourth, the ability to deal with unexpected events such as malicious attacks and computer virus attacks is not enough.
In view of the shortcomings of network security in our town at present, the following rectification suggestions are put forward:
1, further strengthen the training of computer operation technology and network security technology of network security team members, strengthen the awareness of computer operators to prevent network viruses and information security threats, and achieve early detection, early reporting and early treatment.
2. Strengthen the study of computer technology and network technology of cadres and workers, and constantly improve the computer technology level of government officials.
2022 Network Security Self-inspection Summary Report Model Article 3 Network security is related to national security. The leaders of our bureau attach great importance to network security, adhere to the principle of "promoting application with security and promoting safety with application", and always put network security in an important position. Our bureau resolutely implements the spirit of important documents such as the Notice of the Provincial Department of Education on Forwarding the Action Plan for Special Improvement of Internet Website Security of Party and Government Organs, Institutions and State-owned Enterprises in Guangdong Province, the Notice of the General Office of the Guangdong Provincial Department of Education on Submitting the Summary Report of Network Security Inspection in 20__ _ _, and the Notice on Carrying out the Network Security Inspection of Key Information Infrastructure in the City and the Notice on Submitting the Summary Report of Network Security Inspection in 20 _ _ _ _ _. Under the direct guidance of relevant departments, especially the network police detachment of the Municipal Public Security Bureau, a series of methods and measures have been formulated and implemented, and a comprehensive security inspection has been carried out on the education system network of our bureau. Find problems and urge timely rectification. Through comprehensive management, the network security and smoothness of the education system of our bureau are effectively guaranteed. The relevant information is hereby notified as follows:
First, leaders attach great importance to improving institutions.
Our department has set up a leading group for network security inspection with the director as the team leader, the leaders in charge as the deputy team leader and the heads of various departments as members, determined the tasks and division of labor of self-inspection, and earnestly carried out self-inspection and self-correction. Our bureau implements the rules and regulations of higher-level network security management, and formulates rules and regulations such as Information Website Management Regulations and Metropolitan Area Network Management System in combination with our actual situation. We set up hardware firewalls for the internal and external networks of the education system, audit the release of network information, set up a leading group for network public opinion monitoring work, and track and process network information in time to prevent the release and dissemination of classified and harmful information. Convene a meeting on network security in time, raise government officials' awareness of the importance of network security, study network security knowledge seriously, and use computer networks and various information systems correctly in accordance with the provisions of network security.
Second, make careful arrangements and actively promote it.
According to the new situation of network security, our bureau held a working conference on network security inspection of education system, which was attended by the deputy directors in charge of education bureaus in various districts and counties, the stationmaster of audio-visual education, the principals of schools directly under the bureau, and the school system operators. , to clear the requirements, implement the responsibility, formulate the network security implementation plan, and vigorously promote.
First, the website security management adheres to the "number one" responsibility system, and truly leads, organizes, personnel and responsibilities. Websites with backward facilities, poor management and weak security protection capabilities can be closed if conditions permit; For websites with single function and merger conditions, they can be merged; Websites that lack management, maintenance and supervision capabilities should be entrusted to large and powerful network companies.
Second, for schools with more information points or complex networks, a security audit system should be installed independently to conduct a comprehensive security audit of all wired and wireless Internet access devices, and relevant data should be connected to the security management background of the Public Security Bureau.
Thirdly, for schools with few information points and a single network, it is necessary to use the original router or the new router to bind the IP addresses and MAC addresses of all wired computers in the school and clarify the corresponding relationship of address conversion. For campus wireless WIFI devices, the router with wireless management function should be used for user authentication management, and the security audit equipment provided by the network service provider at the Internet exit should be used for unified audit.
The fourth is to strengthen the training of network security technology. Our bureau adopts the training mode of "going out, please come in", and has sent technicians to visit, study and negotiate with the Municipal Economic and Information Bureau and the Public Security Bureau for many times, and invited the leaders and technicians of the Municipal Economic and Information Bureau and the Public Security Bureau to guide the work. Send personnel to Guangdong Education Technology Center for education network and information security training, hold training courses for school information system administrators in the whole city, and train school information system administrators in campus network management technology; A training course on network management technology was held, and technical training was given to system administrators of education bureaus in various districts and county-level cities and network administrators of schools directly under the bureau.
Fifth, make use of various conferences and research activities to actively publicize and educate network security. For example, at the second conference on education informatization held in June 65438+ 10 this year, it was clearly required to further increase investment and strengthen the network security construction of the education system to ensure the safe and stable operation of the education network in our city.
Third, the development of network security detection.
I actively carry out network security inspections, organize network security inspection teams, and conduct a comprehensive inspection of network security by submitting self-inspection reports, field research and spot checks. At present, our bureau and its directly affiliated schools have built 10 websites and rented 5 website spaces. Among them, the Bureau and China Telecom _ _ Branch * * built an education metropolitan area network 1 set, rented a network service platform 1 set, and built an education information network station 1 set; Schools directly under the Bureau have built 9 websites and rented 5 website spaces. ?
Model Report of Network Security Self-inspection and Summary in 2022 Part IV I. Basic situation of hospital network construction
The hospital information management system (HIS system) was upgraded by _ _ _ _ Technology Co., Ltd. on _ _ _ _. After the upgrade, the technicians of our institute will be responsible for the front desk maintenance, and the technicians of _ _ Technology Co., Ltd. will be responsible for the background maintenance and accident handling.
Second, the self-inspection work
1, computer room safety inspection. Computer room safety mainly includes fire safety, electricity safety, hardware safety, software maintenance safety, door and window safety and lightning protection safety. The server room of hospital information system is built in strict accordance with the standard of computer room, and the staff insist on fixed-point inspection every day. The system server, multiplexer and router are all protected by UPS power supply, which can ensure the normal operation of the equipment for 3 hours in the case of power failure and will not damage the equipment due to sudden power failure.
2. LAN security check. It mainly includes network structure, password management, IP management, storage media management, etc. Each operator of HIS system has his own login name and password, and is given the corresponding operator authority. The account operated by others shall not be used, and the management system of "who uses, who manages and who is responsible" shall be implemented for the account. Hospital LANs have fixed IP addresses, which are uniformly distributed and managed by the hospital. You can't add new IP without permission, and unassigned IP can't connect to the hospital LAN. The USB interfaces of all computers in the local area network of our hospital are fully enclosed, which effectively avoids poisoning or leakage caused by external media (such as U disk and mobile hard disk).
3. Database security management. Our hospital adopts the following data security measures:
(1) Separate the part of the database that needs to be protected from other parts.
(2) Adopt authorization rules, such as account number, password, authority control and other access control methods.
(3) The database account password shall be managed and maintained by special personnel.
(4) Database users must change their passwords every six months.
(5) The server adopts virtualization for security management. When the current server has problems, switch to another server in time to ensure the normal operation of the client business.
Third, emergency response.
The server of HIS system in our hospital is safe and stable, equipped with large UPS power supply, which can ensure the server to run for about six hours in the case of large-scale power failure. Our hospital's HIS system has just been upgraded, and the server has not been down for a long time. However, the hospital has formulated an emergency plan and trained charging operators and nurses. If the HIS system can't operate normally due to a large-scale and long-term power outage in the hospital, manual charging, bookkeeping and medicine distribution will be temporarily started to ensure the normal and orderly diagnosis and treatment activities. When the HIS system returns to normal operation, invoices and fees will be supplemented.
Fourth, the existing problems
The network and information security work in our hospital has been done carefully, and there has never been a major security accident. All systems are running stably, and all businesses can run normally. However, the self-examination also found shortcomings, such as the lack of information technology personnel, limited information security force, incomplete information security training, insufficient awareness of information security, and insufficient initiative and consciousness of individual departments to maintain information security; Insufficient emergency drills; The condition of computer room is poor; Individual departments have low computer equipment configuration and long service life.
In the future, we should strengthen the training of information technology personnel, improve the technical level of information security, strengthen the information security education of hospital staff, improve the initiative and consciousness of maintaining information security, increase the investment in hospital informatization construction, improve the configuration of computer equipment, and further improve the work efficiency and the safety of system operation.
Summary Report Model of Network Security Self-inspection in 2022 Chapter V I. Development of Network Security Self-inspection
1. Organization and leadership
The company has set up a leading group for network security and informatization, which is responsible for the organization and leadership of the company's network security-related work, and the network security functional department has conducted a self-examination of the company's information system.
2. System engineering
The company has formulated the relevant system of network security responsibility, and at the same time, under the guidance of the group company system, implemented the relevant system of network security.
3. Financial guarantee
Network security funds have been included in the annual information budget, accounting for 8.64% of this year's information budget. Funds are included in the unified financial management of the unit and accounted for separately to ensure earmarking.
4. System evaluation and archiving
At present, the company has three sets of information systems, all of which are secondary systems, all of which have completed the level protection evaluation and filing, and the security protection level is secondary. The company's network system is an internal and external network dual-network isolation system, and the data interaction between the two networks is realized through the gateway.
5. Daily operation and maintenance
The company specializes in monitoring the daily operation of the network to ensure that the business processing capacity of key network equipment has redundant space. At present, the CPU utilization rate of firewall is 5%, the memory utilization rate is 8%, the CPU utilization rate of virtual application gateway is 0.4%, the memory utilization rate is 19.6%, the CPU utilization rate of core switch is 15%, and the memory utilization rate is 7%, all of which can meet the peak business demand. The network processing capacity and network bandwidth of the company's system are enough to avoid the congestion phenomenon during the peak hours of business.
Firewalls are deployed at network boundaries and areas to achieve boundary isolation, while IDS is deployed inside to monitor and detect external attacks. The system controls the illegal outreach of end users through the North Source Access Gateway, and its security audit and equipment protection measures are effectively controllable.
The access control function is enabled by the firewall application control policy of VLAN partition and network boundary. Boundary integrity cuts off and manages the illegal outreach of end users through the north source access gateway, and adopts the intrusion prevention strategy of IDS, which can monitor the attack behavior online in real time. At the same time, core switches, access switches, virtual application gateways, and server areas provide basic service support for network security through functions such as log auditing, account locking, and information encryption transmission.
Second, the current outstanding problems in network security
1. Low awareness of network security.
Due to the professionalism of network security, some users have low awareness of network security, which leads to too simple password setting. The processing of virus files, Trojan horse information and phishing websites depends entirely on anti-virus software.
2. Network security risk prevention skills need to be further improved.
Due to the complexity of network environment and network technology, there is a higher requirement for users' network security technology.
Third, the next network security work plan
1. Strengthen network security education
Strengthen network security education and training, and enhance users' safety awareness from the perspective of safety awareness.
2. Train network security prevention skills in many ways.
Carry out multi-level and multi-angle network security skills publicity, provide multi-level network security knowledge, and improve the level of network security skills.
2022 Network Security Self-inspection Summary Report Model Article 6 According to the spirit of the "Notice on Carrying out Security Inspection of Government Information Systems" (No.52 [20 _]) issued by the Office of the Municipal People's Government, our town conducted a self-inspection of the information system security of the whole town, and the report is as follows:
I. Self-examination
(a) the implementation of the safety system
1, form a security team. The leaders responsible for information security and the personnel responsible for management and protection are defined, and the security team is the management organization.
2. Established the information security responsibility system. According to the responsibilities, the security team takes the first responsibility for information security, the competent leader takes the overall responsibility, and the specific management personnel take the main responsibility.
3. Established the computer and network security management system. The information management and protection personnel of the town website are responsible for confidentiality management and password management, and enjoy the right to use computers independently. The user name and power-on password of the computer are unique, and it is strictly forbidden to disclose them.
(2) the implementation of safety precautions
1. The classified computer passed the security technical inspection and installed a firewall. At the same time, professional anti-virus software is installed, which strengthens the effectiveness in anti-tampering, anti-virus, anti-attack, anti-paralysis, anti-leakage and so on.
2. All confidential computers are provided with power-on passwords, which are kept by special personnel. At the same time, there is no strict identity authentication and access control between confidential computers.
3. The network terminal has no illegal access to information networks such as the Internet, and no wireless network is installed.
4. Installed professional antivirus software for mobile storage devices.
(3) emergency mechanism construction
1. A preliminary emergency plan has been made. With the deepening of informatization and the reality of our town, it is in the stage of continuous improvement.
2. Insist on contacting the designated maintenance unit of the classified computer system for computer maintenance, and agree to give the greatest support to the town emergency technology.
3. Strictly send and receive documents, improve the system of point, repair, number and sign, and require information administrators to make system backups before going to work every day.
(4) Localization of information technology products and services
1, terminal computer security system, firewall and antivirus software are all made in China.
2. The official document processing software is dedicated to the wps system of Jinshan Software.
3. The salary system and the annual report system are both product systems designated by the municipal government and the municipal party committee.
(5) Safety education and training.
1, send people to participate in the network system security knowledge training organized by the municipal government, and be responsible for the network security management and information security in our town.
2. The security team organized a learning activity of the basic knowledge of information security.
Second, the deficiencies found in self-examination and rectification opinions
According to the specific requirements of the Notice, we also found some shortcomings in the process of self-inspection. At the same time, combined with the reality of our town, we will make rectification in the following aspects in the future.
1, lack of safety awareness. We should continue to strengthen the safety awareness education of government officials and improve their initiative and consciousness in safety work.
2, equipment maintenance, timely update. It is necessary to increase the timely maintenance of lines and systems, and at the same time, according to the characteristics of the rapid development of information technology, increase the updating efforts.
3. The level of safety work needs to be improved. The management and protection of information security is still at the primary level. Improving the modernization level of security work will help us to further strengthen the security prevention of computer information systems and _ _ _ _.
4. The working mechanism needs to be improved. Innovating the safety working mechanism is the inevitable requirement of the new situation of information work, which is conducive to improving the operating efficiency of the network information work of the organs and further standardizing the office order.
2022 Network Security Self-inspection Summary Report Model Article 7 The network provides us with rich information resources and creates wonderful entertainment time and space. It has become an important platform for students to learn knowledge, exchange ideas and entertain, and has strengthened communication with the outside world. However, the network is like a double-edged sword, and some of its bad content can easily hurt students.
From September 7, 2000 to September 23, 2000, our school held the Cyber Security Publicity Week "Cyber Security for the People, Cyber Security Depends on the People".
First of all, make the implementation plan of school safety network publicity week around the actual situation of our school; Secondly, do a good job of publicity, carry out network security publicity and teachers' network security special study in the classroom; Liao Min Normal University also held a cyber security knowledge contest. Finally, carry out "I know network security" activities, further popularize network security knowledge, enhance network security awareness, create a safe, healthy and civilized network environment, safeguard the legitimate rights and interests of teachers and students in cyberspace, and earnestly safeguard national network security.
2022 Network Security Self-inspection Summary Report Model Article 8 According to the spirit and relevant requirements of the Notice on Launching the First National Cyber Security Publicity Week of the Education System in _ _ _ Province issued by the Education Department of _ _ _, under the arrangement of school leaders and the joint efforts of relevant departments, our school launched the publicity and education activities on network security knowledge throughout the school from _ _ _ _ _ _ _ _ _. Through the publicity of network security knowledge and network security education, let students know how to avoid browsing bad websites, learn to let the network help their study, use the network to broaden their horizons, enrich their knowledge, and make rational use of the network to improve themselves in many ways.
During the network security publicity week in our school, we vigorously promoted network security knowledge mainly through the following ways:
1, our school has hung banners with network security propaganda slogans in teaching buildings and gates, effectively rendering the learning atmosphere of network security knowledge.
2. Promote network security knowledge and network security publicity activities through the WeChat public platform of our school.
3. Tell all the students about network security knowledge through the legal education conference in our school.
4. Let the school know more about network security knowledge through the "Knowledge Competition on Preventing Children's Accidental Injury in Primary and Secondary Schools" held in our school on _ _ _ _.
5. In the information technology information column of our school website, a number of related knowledge about network security were released, and the activity records about this network security publicity week were released in time.
6. Each class organized a class meeting to popularize network security knowledge.
In this cyber security publicity week, teachers and students in our school actively cooperated to learn the knowledge of cyber security, fully realized the advantages and disadvantages brought by the network to teachers and students' work and study, enhanced their awareness of preventing cyber security risks, and learned to surf the Internet in a civilized and healthy way.
2022 Network Security Self-inspection Summary Report Model Article 9 According to the spirit of the Notice of the Network Information Office of the County Party Committee, the County Public Security Bureau and the County Bureau of Industry and Information Technology on the Work Plan for Law Enforcement Inspection of Network Security in Anfu County in 20 years, our unit actively organized and implemented it, conducted a self-inspection on the network security infrastructure construction, network security prevention technology and network information security confidentiality management, and made a profound analysis on the network information security construction of our unit. The self-inspection is now reported as follows:
First, set up a leading group
In order to further strengthen the security management of the network information system, our unit has set up a network information work leading group with Director Zuo as the team leader and Section Chief Wang as the deputy team leader, and has a business department to ensure the smooth implementation of the network information security work.
Second, the current situation of network security in this unit
The government informatization construction of our unit began in 20__, and after continuous development, it has gradually developed from the initial small local area network to the current internet. At present, our company has more than 200 computers. Firewalls are used to protect the network, and all computers are equipped with anti-virus software to prevent and control viruses.
Three, my unit network security management
In order to do a good job in information construction and standardize government information management, our unit has specially formulated and established a number of management systems, such as personnel management system, operation and maintenance management system, outsourcing management system and computer room management system. , providing information management, internal computer security management, computer and network equipment management, data, information security management, network security management, computer operator management, website content management and website management. Our unit conducts regular or irregular network security monitoring to keep abreast of the latest network security operation. The main means of network security inspection include network equipment alarm inspection, operation and maintenance inspection platform host monitoring, service startup log inspection, security vulnerability scanning, physical computer room security inspection and so on. Our unit carries out network security monitoring by combining various technical means, and gives early warning of network security incidents in time, which greatly reduces the network security risks of information systems. In addition, our unit organized relevant computer security technology training in the whole unit, carried out targeted "network information security" education and drills, actively participated in other computer security technology training, improved network maintenance and security protection skills and awareness, and effectively guaranteed the normal operation of our government information network.
Fourth, the lack of network security and corrective measures
At present, there are still some shortcomings in the network security of our unit: first, the awareness of security prevention is relatively weak; Second, the virus monitoring ability needs to be improved; Third, the use and management of mobile storage media is not standardized; Fourth, the ability to deal with unexpected events such as malicious attacks and computer virus attacks is not enough.
In view of the shortcomings of network security in our unit at present, the following rectification suggestions are put forward:
1. Further strengthen the training of computer operation technology and network security technology for members of our network security team, strengthen the awareness of computer operators in our unit to guard against network viruses and information security threats, and achieve early detection, early reporting and early treatment.
2. Strengthen the study of cadres and workers in this unit in computer technology and network technology, and constantly improve the computer technology level of cadres.
3. Further strengthen the management of mobile storage media in various departments, requiring personal mobile storage media to be separated from departmental mobile storage media, which are used for storing important work materials of departments and internal office use, and personal mobile storage media shall not be mixed with departmental mobile storage media.
4. Strengthen equipment maintenance, timely replace and maintain faulty equipment, avoid major security risks, and provide hardware guarantee for the stable operation of our network.
Verb (abbreviation of verb) comments and suggestions on information security inspection.
With the continuous improvement of informatization level, people are increasingly dependent on network information. Safeguarding network and information security and maintaining national security and social stability have become urgent problems to be solved in the development of informatization. Due to the shortage of network information professionals in our unit and insufficient understanding of information security technology, other brother township units have more or less similar situations. I hope that the network information office of the county party Committee and relevant parties will strengthen the training and drills of relevant knowledge and improve our preventive ability.
2022 Network Security Self-inspection Summary Report Model 10 In order to further improve financial network security management and continuously enhance network information security, the District Finance Bureau recently conducted a security self-inspection on global financial private networks and Internet.
The self-examination focuses on four aspects: equipment management in computer room, internal and external network management, "double micro" management and personal computer management. According to the principle of "who is in charge is responsible, who is running is responsible" and the requirements of "who uses, who manages and who is responsible", the financial business systems and computers are inspected one by one, and combined with the ongoing computer antivirus software upgrade of the financial private network, the inspection can really find problems and weak links. The problems found in the self-examination such as irregular use of USB flash drive, no password in computer, simple password in business software or weak awareness of network information security were promptly rectified and educated, and Tongchuan yintai district Finance Bureau [20 _ _] No.49 was issued, which established and improved the system and mechanism.
Through this inspection and rectification, the global network security work has been further strengthened, the network information management and users' safety awareness have been enhanced, the standardization, institutionalization and normalization of network security work have been promoted, and the global network security level has been improved.