Security Wheel 安全环
老外的東西就是希望搞環,什么東西都是一個循環,周而復始。
Network security is a continuous process built around the corporate security policy. The security wheel depicted in Figure 1-6 shows a recursive, ongoing process of striving toward perfection—to achieve a secured network infrastructure. The paradigm incorporates the following five steps:
網絡安全是根據公司的安全策略建立起來的一個連續的過程。5個步驟:
Step 1. Develop a security policy
A strong security policy should be clearly defined, implemented, and documented, yet simple
enough that users can easily conduct business within its parameters.
1.建立安全策略
??? 安全策略要清晰,易執行,要編成文檔,用戶能簡單地應用于業務目標。
Step 2. Make the network secure
Secure the network by implementing security solutions (implement authentication, encryption,
firewalls, intrusion prevention, and other techniques) to stop or prevent unauthorized access or
activities and to protect information and information systems.
2.保護網絡安全
?通過認證,加密,防火墻,***防御等技術解決方案保護網絡。
Step 3. Monitor and respond.
This phase detects violations to the security policy. It involves system auditing and real-time
intrusion detection and prevention solutions. This also validates the security implementation in Step
2.
Step 4. Test.
This step validates the effectiveness of the security policy through system auditing and vulnerability
scanning and tests existing security safeguards.
Step 5. Manage and improve.
Use information from the monitor and test phases to make improvements to the security
implementation. Adjust the corporate security policy as security vulnerabilities and risks are
identified. Manage and improve corporate security policy.
?
?
轉載于:https://blog.51cto.com/weber213/499382
總結
以上是生活随笔為你收集整理的Security Wheel 安全环的全部內容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: 信息系统项目管理系列之一:绪论
- 下一篇: 奇妙的Base64编码