-
Security reinforcement is like reinforcing a city wall with various cracks, plugging these cracks and making the wall impregnable. The implementation of security hardening is to eliminate the known vulnerabilities in the information system and improve the key servers and core network equipment.
and other key protection objects. Security reinforcement is mainly for the reinforcement of network and application systems, and is at the network layer of information systems.
Host layer and application layer.
and so on, and establish a security state that meets security requirements. Security hardening generally implements security hardening of different policies for the corresponding information system according to the security level division and specific requirements of the business system with reference to specific system hardening configuration standards or industry specifications, so as to ensure the security of the information system.
Specifically, security hardening mainly includes the following links: System security.
Assessment: including system security requirements analysis and system security status assessment. Security posture assessment uses a large number of security industry experience and vulnerability scanning technology and tools to conduct a comprehensive assessment of the enterprise information system from both internal and external sources to confirm the security risks of the system.
Formulate a security reinforcement plan: Formulate a system security reinforcement implementation plan based on the results of the previous system security assessment. Security Hardening Implementation:
According to the hardening scheme, the system is securely hardened, and the hardened system is comprehensively tested to ensure that the reinforcement has no impact on the system business and achieves the purpose of security improvement. Security hardening involves a wide range of operations, such as the correct installation of software and hardware, the installation of the latest operating system and application software security patches, the security configuration of operating systems and application software, system security risk prevention, system security risk testing, system integrity backup, system account password reinforcement, etc. During the hardening process, if the reinforcement fails, the reinforcement is either abandoned or the system is rebuilt, depending on the circumstances.
Output Hardening Report: The security hardening report is the final report after the completion of information system security hardening, which records the complete process of hardening and suggestions or solutions related to system security management.
-
System hardening concept: It is a method used to analyze and identify operating system and service program weaknesses and introduce appropriate changes to protect the operating system and its service programs from attack. (Analyze the weaknesses of the system and improve the method).
Hardening ideas: Reduce the number of useless software, services, and processes;
Continuously provide access to resources while keeping all software, services, and process configurations in the most secure state;
As much as possible, the system should avoid the disclosure of information about its identity, services, and functions.
Steps to harden the system.
Determine the purpose of the target system.
assess whether the system meets the initial requirements;
Develop security policies based on the requirements of the target system;
Implement system platform reinforcement using a standard component (or component) approach.
Determine the purpose of the target system.
Determine the purpose of each target system on a case-by-case basis, ensuring that no system platform is forgotten.
One of the most dangerous security threats to an enterprise remains the working, forgotten system platform.
Systems that were thought to be replaced, but still function, and serve as hosts to perform unauthorized actions, are the most dangerous security threats to an organization.
System Hardening Guide:
Ports and Processes: Shut down unused processes and services.
Install System Patches: Patch the system.
Password Strength & Storage: Set longer, more random passwords.
Users: Manage accounts and passwords.
User privileges: Security for privileged users.
File System Security: Delete the SUID flag.
Security for remote access:
Service Title, OS Fingerprint:
-
The security reinforcement service refers to the formulation of corresponding system reinforcement plans based on the results of professional security assessment, and reasonable security enhancement is carried out for different target systems through patching, modifying security configurations, and adding security mechanisms. Its main purpose is to:
Eliminate and reduce potential safety hazards.
Periodic assessments and reinforcement work are combined to avoid security risks as much as possible.
-
Of course, there are risks associated with security hardening operations, including downtime, application failure, and in the worst case, system disruption. These risks are generally caused by unclear investigation of the system health status, or may be caused by imperfect reinforcement solutions or misoperations during implementation.
-
The correct answer is: option A Answer analysis: In February 2008, the Ministry of Water Resources issued the "Notice on Further Improving the Risk Removal and Reinforcement of Sick and Dangerous Reservoirs" (Shui Jian Guan [2008] No. 49), large and medium-sized projects must be completed and accepted within 3 years after the completion and acceptance of the main project, and key small projects should be completed and accepted within 1 year from the date of issuance of ** financial special subsidy funds in principle.
Therefore, a is selected for this question. It should be noted that the Ministry of Water Resources has issued the "Guiding Opinions on Strengthening the Acceptance and Management of Small-scale Sick and Dangerous Reservoir Risk Removal and Reinforcement Projects" (Shui Jian Guan [2013] No. 178), which states that the completion and acceptance of small sick and dangerous reservoirs should be carried out within 6 months after the small risk removal and reinforcement projects are completed and tested in a flood season. In the future, the acceptance of the risk removal and reinforcement project of the small sick reservoir shall follow the relevant provisions of the Guiding Opinions.
In the past, most of the traditional structural reinforcement was cement, but with the passage of time, more and more new reinforcement technologies have emerged to strengthen and repair the structure in different aspects. In recent years, carbon fiber reinforcement has become a new darling, and many housing buildings and water conservancy facilities will use carbon fiber reinforcement. So, what are its unique advantages? >>>More
Only use the SSD to connect it, enter the BIOS, set the hard disk mode to AHCI mode, and then set the U disk as the boot disk, so that you can use the U disk to boot, and you will recognize your SSD when you enter the PE system. This will allow you to do the partitioning operation.
1. Concrete reinforcement: Concrete reinforcement of the house is convenient for construction, saving money and time. >>>More
1. Connection reinforcement and reinforcement connectionThe steel structure connection method is the selection of welds, rivets, ordinary bolts and high-strength bolt connection methods, which should be strengthened according to the cause, purpose, structure and construction conditions according to the need, and the original connection method of the structure should also be considered. Steel structure reinforcement is generally more suitable for weld connection, friction type high-strength bolt connection, can also be based on weld and friction type high-strength bolt mixed connection, when using weld connection, the use of approved welding technology and connection materials. >>>More
1. The concept of meridians.
Meridian is a general term for meridians and meridians. The meridian, also known as the meridian, has the meaning of a path. The meridians run through the upper and lower levels, communicate the inside and outside, and are the backbone of the longitudinal line in the meridian system. >>>More