⎝⎛韦德足球⎞⎠

Tianjin Optoelectronics Group (State-owned 754 Factory)
Tianjin Optoelectronics Anchen Information Technology Co., Ltd.

Focus on information security for 70 years
Stock code: 871339

Service Hotline: 4009999754

Level protection solution

2018-12-06

Introduction
Information security level protection requires that information systems with different security levels should have different security protection capabilities. On the one hand, it is achieved by selecting security controls that are compatible with the security level in terms of security technology and security management; on the other hand, the information systems distributed in the information system Different security controls in security technology and security management, through the interrelationships of connection, interaction, dependence, coordination, collaboration, etc., work together on the security functions of the information system, making the overall security function of the information system and the structure and security control of the information system The interrelationships among different levels, levels and regions are closely related.
The security protection level of the information system is divided into the following five levels
First level: After the information system is damaged, it will damage the legitimate rights and interests of citizens, legal persons and other organizations, but it will not damage national security, social order and public interests.
Second level: After the information system is damaged, it will cause serious damage to the legitimate rights and interests of citizens, legal persons and other organizations, or damage to social order and public interests, but it will not harm national security.
Level 3: After the information system is damaged, it will cause serious damage to social order and public interest, or damage to national security.
Level 4: After the information system is damaged, it will cause particularly serious damage to social order and public interest, or serious damage to national security.
Level 5: Damage to information systems can cause particularly serious damage to national security.
Security Risk Analysis Model

☆ Physical environment safety
Environmental accidents such as earthquakes, floods, fires, lightning, etc., operation failures of electrical equipment and other supporting equipment in the equipment room, electrostatic interference due to poor grounding, and poor shielding performance in the equipment room or external electromagnetic interference
☆ Equipment safety
Physical damage and loss of equipment, unauthorized use of equipment, leakage of output information
☆ Storage media security
Damaged, lost or unauthorized use due to improper storage or use
☆ Equipment operation safety
Improper energy supply, improper backup and recovery measures, and inappropriate defense against viruses and malicious code
☆ secret information security
Risks caused by improper access control and identification measures, improper password protection measures, electromagnetic leakage
☆ Security for unauthorized personnel
Lack of effective management and control of authorized personnel in important areas
☆ Communication line security
Artificial or non-artificial security risks of optical fibers and twisted pairs in use
Elements of Information Security Level Protection Evaluation
☆ Identification
☆ Autonomous access control
☆ For passenger weight
☆ Integrity
☆ Audit
Application service workflow, data content transmitted in the process, data protection measures taken by the transmission links (customer terminals, routers, switches, central server nodes), application service support platforms (such as SQL Server 2000, etc.) Survey the security status of each component and the security status of each component in the application service process.
According to the verification scheme, the field operator assists the evaluation engineer to complete a full-process application service. The evaluation engineer determines the implementation status of the security elements on the access path and conducts on-site verification according to the security protection measures taken or possible during this process.
Based on the results of the assessment, summarize the status of the implementation of system security elements, determine the level of security achieved by the information system, propose feasible security recommendations, and write a comprehensive security evaluation report.
Evaluation of Security Assurance Requirements The evaluation of security assurance requirements is mainly to communicate with assisting personnel, and to review and analyze relevant documents during the system development process. The content of the inspection includes the security protection of the information system itself, password support, life cycle support, configuration management, development, testing, guidance documents, vulnerability analysis, delivery and operation, etc.
Grade protection safety design requirements
Design method of hierarchical protection security system
Level Protection Security System Security Platform Structure Definition
Level protection security operation and maintenance process
Level protection overall security operation and maintenance system
真人游戏平台注册 七乐彩 欢乐拼三张 欢乐拼三张