JustPaste.it

What aspects does computer operation security include?

User avatar
poujtyhg @poujtyhg · Apr 24, 2024

16.jpeg

Operational security is the task that organizations need to complete when responding to security threats. This concept includes computers, networks and communication systems as well as the management information running in them, covering a large number of security fields and technical fields.Server rack cabinet Ensuring operational safety is the primary task that a safety personnel must face.

Operational security issues mainly include: network access control, authentication, and achieving a secure network topology. At the same time, in order to ensure the safe realization of system functions, corresponding security measures are provided, such as risk analysis, audit tracking, backup and recovery,rack 42u and emergency procedures, to protect the security in the information processing process. Unlike physical security, which places the security goal on data and In terms of assets (represented by maintaining servers or hosts that store data), operational security focuses on networks and connections, and refines specific operating mechanisms to ensure the security of the above two.

Ensuring operational safety is inseparable from physical security and management security. Operational security can make up for deficiencies and security threats caused by deficiencies in physical security.server rack server For example, a host that does not have secure password control can improve its security by formulating and implementing a password rotation plan, or it can apply to relevant agencies to replace or add secure password control functions in accordance with established management regulations. However, ensuring operational safety relies heavily on good management safety. As in the above example, if a password rotation plan has been formulated and implemented (the password must be updated once every 30 days, the password must be a string of no less than 8 characters of mixed uppercase letters, lowercase letters, and numbers), but the relevant operators have not changed it in the prescribed time If password modification operations are performed as required during this period, this password rotation plan will not improve security.

The following terms relate to areas related to operational security:

Network access control: Ensure that network information resources are not used without authorization. Access control restricts the access process based on the access authorization relationship between the subject and the object.

Identity verification: Ensure that information users and information service providers are true claimants, preventing impersonation and replay attacks.

Risk analysis: In order to make the computer information system operate safely, we must first understand the many factors and existing risks that affect the safe operation of the computer information system, then conduct risk analysis and find ways to overcome these risks.

Audit tracking: Use the audit tracking tools provided by the computer information system to conduct detailed tracking and records of the working process of the computer information system. At the same time, keep audit records and audit logs, and promptly discover and solve problems from them to ensure the security of the computer information system. Run reliably. This requires system administrators to be responsible and effectively save, maintain and manage audit logs.

Emergency measures and backup recovery: both should be considered together. First of all, an emergency plan including emergency response, backup operations, and recovery measures must be formulated based on the functional characteristics and disaster characteristics of the information system used. Once a disaster event occurs, the normal operation of the computer system can be restored to the maximum extent according to the plan.