With the development of information technology and industry penetration, the tobacco industry's information technology network technology applications gradually deepen, the problem also comes: computer network protection capability is weak, the amount of stored data is getting bigger and bigger, the information security problem dramatically increased, network security risks can not be effectively safeguarded, the enterprise information is difficult to get safe and effective protection, the enterprise network security problem is not optimistic. Therefore, in-depth discussion of network security issues, the establishment of a sound security monitoring mechanism, to explore the security protection strategy is very necessary.
1 network security
Network security refers to the security of information transmitted on the network, network security covers the network system hardware, software and data in the system will not be attacked, tampered with, destroyed, leaked, interrupted and other phenomena, that is, the hardware equipment should run stably, the software system is stable and reliable, the network is continuous and secure. uninterrupted, comprehensive and secure data. Network security issues should not only be technically effective risk control, focusing on the prevention of external invasion, hacking, viruses, etc.; but also from the management to strengthen control, focusing on the human factor. Computer network security issues, the main problem is the virus, computer in the network environment, in the case of external devices such as USB flash drives, mobile hard drives, CD-ROMs and other connections, computers are susceptible to infection of viruses, do not remove the virus in a timely manner, will bring a series of problems, the simplest and most direct is to reduce the operating speed of the computer, viruses lead to file breakage or even loss, to the user's inconvenience; serious viruses and even Serious viruses even tamper with the system program, illegal invasion of computers to steal important data and information, bringing the threat of information security to users. Network security management division of labor, responsibilities are not clear, the use of authority does not match, the sense of confidentiality is weak, the network security is not enough to pay attention to, easy to cause the situation of encountering things to shift the blame on each other. In addition, the network security management personnel training needs to be strengthened.
2 network security technology protection
2.1 Firewall technology
Firewall technology is actually an isolation technology, the computer and the internal network, the external network, public **** network, private network erected between an isolation and protection of the barrier, the data and information by the firewall isolation from the computer outflow. Protection of encrypted information; external data and information flow into the computer through the firewall, the outside world has a virus, insecurity, uncertainty of the factors isolated. Firewall is a combination of software and hardware, is the first basic method of computer to solve network security problems.
2.2 Upgrade the operating system, repair vulnerabilities
Computer operating system itself is complex structure, procedures, operating system vendors are constantly updating and improving the system, users should upgrade the operating system in a timely manner, make up for the latest patches, repair the system vulnerabilities, in order to defend against a variety of malicious invasions, to minimize the risk of the system.
2.3 Installation of anti-virus software
The most basic and important part of protecting the security of a user's computer network is the installation of anti-virus software, such as 360 Antivirus, Rising Star Antivirus, etc. The anti-virus software can be used to protect the user's computer network from being damaged or destroyed by the user's computer. Through the regular use of antivirus software to computer hard disk and network environment scanning, for which the file, e-mail, and the generation of executable files.exe scanning, find and remove the virus file. In addition, the user needs to frequently update the virus database in order to prevent the invasion of new viruses.
2.4 database management
Database stores all the data and information of the computer, is a very important part of the computer system, in order to prevent the occurrence of unexpected situations, the database should be used for a backup of the dual database, the use of information technology systems in the tobacco industry, with the use of time and use of the scale of the increase in the increase in the amount of data, in addition to the use of a backup of the database management mode, the more Should build database disaster recovery management, dual hot standby, etc., in order to cope with emergencies, in order to achieve the security management and maintenance of the database, to ensure that the system data and information security, accuracy and comprehensiveness.
2.5 Data encryption technology
In the environment of the surge of data volume, the demand of users to use the network to view information anytime and anywhere, and the increasingly widespread use of big data and cloud computing, it is more prominent to ensure that the user's data is effective, complete, and confidential. Data encryption technology for cloud computing and big data, is a well-established confidentiality, security technology, the principle is that the user of a part of the data to launch a query command, the cloud will be sent out after the data to be encrypted software converted into encrypted files for transmission, and then transmitted to the user side before the decrypted files for restoration. Encryption and decryption processes are inseparable from the key link is the key. Data encryption technology in the Internet big data, cloud computing environment, is very necessary. The key is the encryption key, which ensures the authenticity, reliability, and confidentiality of data transmission through encryption.
3 network security management
3.1 Strengthening preventive measures
The protection of computer network security not only requires technical means of escort, but also requires the improvement and enhancement of management means. Tobacco industry network management part of the need to establish a network monitoring management system and mechanism, arranged to carry out the necessary daily inspections, vulnerability updates and other routine operations, and regularly on all computers for confidentiality checks, the information and data within the computer to carry out a comprehensive monitoring, and found that the anomalies are dealt with in a timely manner. Secure, reliable and complete monitoring and management means can prevent external attacks to a certain extent. Formulating reasonable network management norms and security systems can fundamentally and effectively prevent the loopholes generated by human factors. Regulate Internet behavior and formulate Internet behavior management norms to effectively reduce the losses caused by the misuse of the Internet by internal employees. The development of mobile storage device management system, to eliminate the storage of confidential information storage devices, notebook computers and other equipment to be taken away from the post or unit, if necessary, need to establish an application system.
3.2 Strengthen the management system
Tobacco industry information management department to establish a sound network security management organization and related systems, so that the relevant personnel in the process of work to do a clear division of labor, there is a Zhang can be followed, the responsibility of the person. For the risk to have a strict prevention and control mechanism, there are problems to have a reasonable and rapid solution to follow, the accident rate will be minimized. The establishment of a perfect management work handover, the use of the authority to hand over the system and rules, network managers such as job transfer, resignation, retirement, etc., the handover of work to follow.
3.3 Focus on talent training
Computer, network technology requires specialized personnel to run and manage, therefore, strengthen the tobacco industry network management professional and technical personnel team construction and ability to enhance the tobacco industry network security level is of practical significance. Focusing on the introduction of senior talents and the cultivation and training of existing personnel, the network management personnel will be trained in professional knowledge, popularize information security technology, organize information security and confidentiality knowledge learning, listen to industry development lectures by relevant experts, and improve the overall quality of the network management personnel, which is forward-looking from the professional skills to the macroscopic overall situation. The information center network security personnel for information technology and network professional and technical training, including unified standards, database maintenance, network technology, computer network administrators and operators for professional training, strengthen professionalism, improve personal capabilities, and cope with the development and changes of new technologies.