Current location - Loan Platform Complete Network - Local tax - Summary of Network Security Work
Summary of Network Security Work
How time flies! A period of work has ended. I believe you have gained a lot during this time, which means you are ready to start writing your work summary again. So how is the general work summary written? The following is a summary of the network information security work I have compiled for you (7 general remarks), hoping to help you.

Summary of network security work 1 With the approach of the New Year, the intense work of the year has also reached the stage of ending. With nearly two years' work experience, I have improved my work experience, technical level, cultural exchange and self-cultivation, learned some correct processes of analyzing and solving problems, made daily work plans and made some simple summaries in time after relatively important things to gain experience, as well as some indispensable skills and methods in my work and life, which will play a great positive role in my future work and life. Generally speaking, I am basically satisfied with my work process and results in the past 1 year.

In this year's work, in the process of continuous practice and completion of all aspects of work, I still encountered some obstacles and difficulties, but most of them were overcome.

As for the computer server, I seriously taught myself some server knowledge to supplement my own server knowledge, understood the basic architecture of the server and the difference with ordinary PC, supplemented the knowledge of array and cabinet, simply used the tool tray of Hp Server Navigator, installed the server system once by myself, and learned some simple means of fault judgment, recovery and handling.

On the network side, I am basically familiar with the functions and configurations of various Cisco devices and some basic fault diagnosis, recovery and handling methods. On the eve of network rectification this year, my colleague Sean and I went to the network information center to discuss the network rectification plan. At the same time, I carefully studied the network structure of the network information center. After coming back, I discussed and revised the scheme with the safety engineer of Chongqing Tianrongxin Company together with Director Tang, Teacher Gao Panyu and Sean. This experience made me gain valuable experience in network technology again. Not only let me know more and wider knowledge about network and network security, but also let me re-recognize and understand some vague knowledge and concepts that I knew before but didn't use too much, which strengthened and supplemented my network knowledge structure. Only when the network was rectified later, I didn't have time to take part in the rectification because I participated in the development of the estuary forecasting system. Although I am familiar with the topology of large-scale network structure, I am not proficient in some details of equipment configuration. This knowledge will be supplemented when I am free next year.

In terms of network viruses, basically you can find all kinds of viruses without relying on anti-virus software. With the progress of science and technology and the wide application of computers, 20xx is also a year in which viruses are widely active. The diversity of a virus also greatly improves the destructive power and infectivity of the virus. Basically, there are few simple stand-alone viruses, all of which have network characteristics. Taking worms as an example, some worms not only widely infect computers to seize computer and network resources, but also have the ability of hacker tools to open back doors, steal information, attack network devices, DDOS attacks, Arp spoofing and so on. Their destructive power has far exceeded that of simple worms, and the destructive power of a diversified virus is obvious! In 20xx, the network of our bureau was hit many times, resulting in network paralysis, most of which came from within our bureau's network. The security problem of intranet is imminent. Many accidents were solved in time and effectively through the concerted efforts of all our network personnel, Qi Xin, without any impact on the final result of our water information transmission. I found a quick method and routine in the project of killing impact network virus many times, and published the article "Several Experiences of Hydrological Upstream Bureau in Dealing with Network ARP Deception Fault" on Hydrological Network. At the same time, I also found many network management and analysis tools, which greatly improved our efficiency in dealing with faults in the process of mastering these tools. Cisco Equipment Management Assistant Series, SnifferPortable, etc. have become an indispensable part of our network.

In terms of software development, I used my spare time to write some small softwares that are convenient for daily news reporting and network detection, and rewritten the sub-center news monitoring and time printing software to make it more convenient to use, understand and modify. We have compiled the query software for the dispatching of the Three Gorges Project, which improves the efficiency and accuracy of monitoring the messages sent to the dispatching of the Three Gorges Project, thus saving more time to deal with other abnormal faults. The network monitoring software is compiled, which can record the network interruption time in detail and give real-time alarm to the network interruption, thus reducing the burden of network monitoring. During my work, I participated in the development of the background management part of "Jiangkou Reservoir Dispatching System" and completed the work on time and with good quality. After the above work and study experience, I feel that my software design and writing level has been improved qualitatively, especially after I participated in the development of the background management part of Jiangkou Reservoir dispatching system, I communicated with the technicians of software companies, which improved my understanding of large-scale software engineering systems, re-recognized the necessity of pre-planning and designing and writing a large number of documents, and re-recognized the importance of database design and architecture. When writing this part of background management, I greatly improved my code writing and planning ability, tried to make my code easy to read and modify, strengthened the hierarchy, reduced the coupling of the code, and avoided inefficient repeated writing. At the same time, in the development, I also use C# language for development. Net program, and then learned to write VB language, trying to get rid of the shackles of programming language, but to master a programming idea and concept. The development of "Jiangkou Reservoir Dispatching System" is a very precious and rare experience for me.

In the aspect of automatic message monitoring, I have completed my work conscientiously. I checked the network in advance before sending the message, and helped the sub-center to solve the problem after the message appeared, or carried out related operations according to the needs of the sub-center. I have never caused any loss to the sub-center for personal reasons. Since March of 20XX, I have implemented the new message coding rules and mastered the new message coding format, which ensures that I can help the sub-center find the message problems in time and make it modify the guarantee in time.

In the course of a year's work, I still exposed some shortcomings. In the process of work, due to lack of experience, I will encounter some problems. Fortunately, there are no serious consequences. My shortcomings can be summarized as follows.

1, people-to-people communication ability needs to be improved.

2. Server knowledge needs to be improved.

3. English ability needs to be strengthened.

4. It is necessary to plan the assigned work more carefully and efficiently, so as to improve work efficiency.

We need to be more proficient in the configuration of network equipment now, and we need to supplement the knowledge of frame relay.

6. We should also strengthen the study of network security knowledge, don't blindly solve problems after they happen, and learn to prevent them before they happen.

I will use the new year to continue to improve my technical level and work experience, focusing on improving my shortcomings and deficiencies. At the same time, strengthen study and make full use of spare time to "charge" yourself.

The above is my summary and understanding of this year's work. During this period, I would like to thank Director Wang, Director Tang and all the teachers for their concern and teaching. They have given me great help in life and knowledge, and they have been considerate in all aspects of our work, so that I can concentrate on my work and have no worries, and let me integrate into the big group of water affairs room as soon as possible. I am proud that I can work here and make contributions to my country!

The new year is coming and we are about to meet new challenges. The problem is inevitable. It is important that we face and solve problems bravely, instead of procrastinating and avoiding them blindly. I will constantly improve my technical level, give full play to the value of computers and serve our hydrological cause.

Summary of Network Security Work With the correct leadership and strong support of the party group of the Municipal Bureau, the 2 xx Bureau attached great importance to the network and information security work, established the idea of "network and information security is no small matter", held a special meeting to deploy this work, acted quickly as a whole, and carried out strict and meticulous self-examination to ensure the smooth development of all work. The main methods are:

First, the management of computer confidential information

Our bureau strengthens organizational leadership, publicity and education, implements work responsibilities, strengthens daily supervision and inspection, and pays special attention to the management of classified computers. Used to manage computer magnetic media (floppy disk, U disk, mobile hard disk, etc.). ), take special personnel to keep confidential files alone, and it is forbidden to bring magnetic media containing confidential contents to computers on the Internet to process, store and transfer files, thus forming a good security and confidentiality environment. Confidential computers (including laptops) have been physically isolated from the internal and external networks, and security measures have been implemented in accordance with relevant regulations. So far, there has been no computer compromise or leakage accident; Other non-confidential computers (including laptops) and network use have also implemented relevant measures in strict accordance with the management measures of the bureau's computer security information system, ensuring the information security of the agency.

Second, the computer and network security situation

The first is network security. Our bureau strictly separates the internal and external networks of computers. Only a few departments in the world keep the external network because of their work needs, and the rest of the computer functions are on the internal network. For computers that can be connected to the external network, the system of online registration is implemented, and the practice of mixing computer magnetic media inside and outside is resolutely put an end to, which clarifies the responsibility of network security and strengthens the network security work.

Second, in daily management, do a good job in the "five-layer management" of extranet, website and application software, ensure that "confidential computers are not connected to the Internet, and computers connected to the Internet are not classified", and handle the management, maintenance and destruction of CDs, hard disks, USB flash drives and mobile hard disks in strict accordance with confidentiality requirements. Focus on the "three major security";

First, hardware security, including lightning protection, fire prevention, theft prevention and power connection;

The second is network security, including network structure, security log management, password management, IP management, online behavior management and so on.

Third, application security, including website, email system, resource management, software management, etc.

Three, the use of hardware equipment is reasonable, the software setting is standardized, and the equipment is in good running condition.

Every terminal in our bureau has installed anti-virus software and application specifications of system-related equipment. The use of hardware equipment conforms to the relevant national product quality and safety regulations, the unit hardware operation environment meets the requirements, and the basic equipment such as printer accessories and ribbon racks are original products; The lightning protection ground wire is normal, the defective lightning protection socket has been replaced, the lightning protection equipment is basically stable, and no lightning accident has occurred. The website system is safe and effective, and there are no security risks at present. The composition and configuration of the network system of our bureau are reasonable and conform to the relevant safety regulations; All kinds of hardware equipment, software and network interfaces used in the network have also passed the safety inspection and appraisal before being put into use, and have basically operated normally since installation.

Fourth, strict management and standardized equipment maintenance.

Our bureau implements the management system of "who uses, who manages and who is responsible" for computers and their equipment. In terms of management, we:

First, adhere to "system management".

The second is to strengthen information security education, train network security and system security related knowledge, and improve employees' computer skills.

At the same time, the publicity of network security knowledge is carried out on a global scale, so that all employees realize that computer security protection is an organic part of the work of "three defenses and one guarantee". Moreover, under the new situation, computer crime will become an important part of security work. In terms of equipment maintenance, a network equipment fault register and a computer maintenance table are specially set up to register equipment faults and maintenance and deal with them in time. For foreign maintenance personnel, it is required to be accompanied by relevant personnel, and their identity and handling situation should be registered to standardize the maintenance and management of equipment.

The formulation and implementation of verb (verb's abbreviation) security system

In order to ensure the safety of computer network, the network administrator system, computer security system, website security management system and emergency plan for network information security emergencies have been implemented, which effectively improved the work efficiency of administrators. At the same time, our bureau has formulated the computer system safety self-inspection system according to its own situation, so as to ensure four things:

First, the system administrator regularly checks the central computer system every Friday to ensure that there are no hidden dangers;

The second is to make safety inspection records to ensure the implementation of the work;

The third is to implement the system of regular inquiry by leaders, and the system administrator reports the use of computers to ensure that the situation is always grasped;

Fourth, regularly organize global personnel to learn network knowledge, improve the level of computer use, and ensure prevention.

Six, self-examination problems and rectification opinions

We found some weak links in management during the self-inspection, and we will make improvements in the following aspects in the future.

(a) for irregular lines, exposed, immediately rectification lines within a time limit, and do a good job of rat prevention and fire safety.

(2) During the self-examination, it was found that individual personnel were not aware of network and information security. In the future work, we will continue to strengthen the network and information security education and prevention skills training, so that cadres and workers can fully realize the importance of network and information security. Combine civil air defense with technical defense, and do a good job in network security of the unit.

Summary of Network Security Work 3 According to the spirit of the Notice of the County Party Committee Office on Developing Network Information Security Assessment, our town actively organized and implemented the self-inspection of network security infrastructure construction, network security prevention technology and network information security management, and made a profound analysis of the network information security construction in our town. The self-inspection is now reported as follows:

First, set up a leading group

In order to further strengthen the security management of network information system, our town has set up a leading group for network information work, with the mayor as the leader and the deputy secretary in charge as the executive deputy leader, and an office under it to ensure the smooth implementation of network information security.

Second, the status quo of network security in our town

The construction of government information in our town began in xxx, and after continuous development, it gradually developed from the initial small local area network to the current internet. At present, there are 29 computers in our town. Firewalls are used to protect the network, and anti-virus software is installed to prevent and control the viruses of computers in the town.

Three, my town network security management

In order to do a good job in informatization construction and standardize government information management, our town has specially formulated a number of systems, such as xx Town Network Security Management System, xx Town Network Information Security Protection Work Plan, xx Town Virus Detection and Network Security Vulnerability Detection System, which provide information management, internal computer security management, computer and network equipment management, data and information security management, network security management, computer operator management, website content management and website management.

In view of the computer security work, our town has formulated the "xx Town Information Release Audit Registration System" and "xx Town Information Network Emergency Plan" and other related systems. By regularly sorting out all the information on the website, no information related to security and confidentiality was found; Sign the Responsibility Letter of xx Town 20xx Network Information Security Management with the members of the network security team to ensure that "whoever uses the computer is responsible"; Strictly regulate and manage the data information generated by the intranet in our town, and file it in time; In addition, our town organized relevant computer security technology training throughout the town, carried out targeted "network information security" education and drills, actively participated in other computer security technology training, improved network maintenance and security protection skills and awareness, and effectively guaranteed the normal operation of our town government information network.

Fourth, the lack of network security and corrective measures

At present, there are still the following deficiencies in the network security of our town:

First, the security awareness is weak;

Second, the virus monitoring ability needs to be improved;

Third, the use and management of mobile storage media is not standardized;

Fourth, the ability to deal with unexpected events such as malicious attacks and computer virus attacks is not enough.

In view of the shortcomings of network security in our town at present, the following rectification suggestions are put forward:

1. Further strengthen the training of computer operation technology and network security technology for members of the network security team in our town, strengthen the awareness of computer operators in our town to guard against network viruses and information security threats, and achieve early detection, early reporting and early treatment.

2. Strengthen the study of cadres and workers in our town in computer technology and network technology, and constantly improve the computer technology level of cadres.

3. Further strengthen the management of mobile storage media in various departments, requiring personal mobile storage media to be separated from departmental mobile storage media, which are used for storing important work materials of departments and internal office use, and personal mobile storage media shall not be mixed with departmental mobile storage media.

4, strengthen equipment maintenance, timely replacement and maintenance of faulty equipment, avoid major security risks, and provide hardware guarantee for the stable operation of the network in our town.

Verb (abbreviation of verb) comments and suggestions on information security inspection.

With the continuous improvement of informatization level, people are increasingly dependent on network information. Safeguarding network and information security and maintaining national security and social stability have become urgent problems to be solved in the development of informatization. Due to the lack of network information professionals in our town and insufficient understanding of information security technology, other brother towns have more or less similar situations. It is hoped that the office of the county party committee and relevant parties will strengthen the training and drills of relevant knowledge and improve our preventive ability.

Summary of Network Security Work 4 In order to conscientiously implement the spirit of the 18th CPC National Congress, build a harmonious, stable and sustainable new environment for good development, effectively strengthen the construction of emergency management in our township, and constantly improve the ability of various functional departments and units under our jurisdiction to respond to and handle public emergencies. According to the notice requirements of XX County People's Government Office on submitting the summary of emergency management work in the first half of 20xx, combined with the actual situation in our township, various emergency management work was carried out in a solid and effective manner. The emergency management work in my hometown for half a year is summarized as follows:

1。 At the beginning of the year, the township party committee and government adjusted and enriched the emergency management leading group and the township flood control headquarters leading group based on the reality of our township, improved the mechanism, defined the responsibilities, refined the work, determined the goals, and incorporated emergency management into the year-end target assessment of each village.

2. Establish and improve the township flood control plan, township flood control plan, township geological disaster emergency plan, township geological disaster prevention plan and four geological disaster emergency plans, and clarify the responsible persons, evacuation routes and specific responsible persons for the elderly, the sick and the disabled. The working mechanism has been established and improved, and various emergency work has been effectively carried out, achieving the work effect of planning, step by step, method, early prevention and zero casualties.

3. Establish and improve the emergency management information ledger, further implement the contact information of emergency institutions, and strengthen the networking, informationization and standardization of emergency management. The township government office pays special attention to the timely reporting of daily reports, and there is no "wrong, missing, dragging, hiding or poor" situation.

4. Arrange special personnel to participate in all kinds of safety emergency management training meetings and study organized by the municipal government in time. There is no absence without reason, and the participants are not late, absent or leave early during the meeting and study. The staff of the township emergency office regularly investigate the geological disaster points in my township, and rectify them in time when they find potential safety hazards.

5. Emergency management in villages and towns: According to the requirements of superiors and the actual situation in my township, an emergency team of 20 people was set up in villages and towns to ensure the effectiveness of "coming at once, being able to fight and being invincible". Every village has set up an emergency team to deal with emergencies in its own area. In order to improve the ability of emergency handling and rescue work, reduce the harm of emergencies to society, protect the safety of people's lives and property, maintain social stability and harmony, do a good job in disaster prevention and mitigation, minimize the loss of emergencies, and do a good job in emergency rescue and response. Township emergency offices should assign special personnel to be responsible for daily work, and emergency material reserve rooms should be supervised by special personnel, establish emergency material reserve ledgers and use ledgers, and constantly improve emergency material reserves.

6. In order to ensure the safety of people's lives and property, and prevent all kinds of sudden disasters scientifically and effectively, our township actively cooperates with the higher authorities to conduct scientific and effective investigations on locations, lots, industries and departments with certain security risks in time. Through investigation, two potential safety hazards were eliminated, and problems in road traffic, safety production, drug and food management, information and communication were thoroughly rectified.

7, actively carry out food and drug, disaster prevention and mitigation, earthquake disaster emergency, campus and drinking water safety knowledge training, and earnestly focus on learning, extensive publicity, mutual help and create a good social atmosphere for emergency prevention and control.

8, improve the early warning mechanism, improve the early warning communication network construction. Do a good job in flood control duty during flood season, adhere to the duty system of having a shift leader on duty and a duty leader on duty, clarify the responsibilities of the personnel on duty, keep the mobile phone on for 24 hours, and fill in the duty record. Each village implements the responsibility of the personnel on duty and defines the key areas within its jurisdiction. The staff of township emergency office always pay attention to the weather forecast information released by superiors and keep abreast of the latest weather conditions. At the same time, it is necessary to increase the study of business knowledge, and the emergency information reporter should submit the information in strict accordance with the requirements of the superior.

9. The township government emergency office has formulated a 20xx flood control emergency drill plan for our township, and the preparatory work in the early stage is under way. A flood control drill is planned for early June.

10, urging schools to do a good job in establishing "emergency education demonstration schools". The establishment of the "emergency education demonstration school" was personally grasped by the leaders in charge, and the main leaders of the school specifically grasped it.

1 1, the main problems in the work.

There are still some problems in emergency management in my township: First, some cadres in party member do not pay enough attention to emergency management. Second, the propaganda forms of emergency management and disaster prevention and self-help are not enough, and the people's understanding of emergency management is not comprehensive, their knowledge is not rich, and their self-help ability is not strong enough. Third, the emergency plan is not detailed enough and the quality of the plan needs to be improved. Fourth, the funds for emergency management, emergency drills and emergency management training are insufficient.

In a word, under the correct leadership of the county party committee and the government, the emergency management work in our township adheres to the guidance of the spirit of the 18th National Congress, conscientiously implements the work responsibilities, improves the work requirements, and there are no major hidden dangers and dereliction of duty. Under the correct leadership of the county party Committee and the government, we will constantly check and fill the gaps, make up for some shortcomings in our work, continue to innovate and strive for happiness.

Summary of network security work 5 According to the division of functions after institutional reform, the county administrative examination and approval bureau is the department with the largest amount of government data in the future, and the task of data security is very arduous. Data security equipment and technical support are still insufficient. Combined with the current work of the county administrative examination and approval bureau, the report is as follows from three aspects: "source, point and line":

First, the data source is secure. The county administrative examination and approval bureau is the main source of government affairs data, and its work forms include the private network used by all units and the extranet of provincial and municipal government affairs. In the former form, the data is generated in the vertical system of each unit or province, and the data output source is a proprietary working computer. All units must supervise their work computers. The county administrative examination and approval bureau adopts the mode of "one machine, one line, one system and one firewall" to ensure that the network interface of data leakage is cut off. In the latter form, the data source is in a free and open network environment, and the data submission interface is in the provincial and municipal government system server, so there is no need to ensure the security of the source data.

The second is to ensure the security of data nodes. County-level data station of big data is a necessary link in the development of county-level big data industry, an ocean of county-level data collection and the core of future data security work. The county administrative examination and approval bureau combed the county's existing government affairs system and government affairs data resource catalogue, and formed two lists of system and data resources, which made good preparations for the county to break the data barrier and realize data enjoyment, and ensured that the data entered the station according to the specifications and left the station according to the authorization.

The third is to ensure the safety of the data line. The communication between data source and data station, and between data station and superior or adjacent data station requires security software. At present, all existing systems have their own security measures. After all the examination and approval functions are transferred, the county administrative examination and approval bureau will build a unified data security software guarantee system.

Summary of Network Security Work Since 6-20xx years ago, the township has strictly implemented the "Management System of Computer Network Security in Units", and there have been no safety accidents such as information leakage and network intrusion throughout the year, and the computer network is running well. The specific summary is as follows.

First, strengthen awareness.

Leaders attach importance to in order to strengthen the construction of computer network security, our township has set up a special network security leading group, composed of political and legal cadres and members of the township discipline inspection commission, with the township head as the team leader. The group mainly supervises the implementation of the network security system of township governments, and urges network service providers to do a good job in line inspection and maintenance. Based on the working idea of "combining prevention with control, giving priority to prevention", the Group improves the network information security ability of government departments and strengthens the information security awareness of government staff in the process of networked office work. To prevent and reduce the occurrence of network security accidents to the maximum extent, and to maintain the network information security of villages and towns.

Second, effective measures.

In order to solve the problems of lack of knowledge and low safety skills of cadres and workers in township government departments, township governments specially organized network information security training, and the participation rate reached 100%. After the training, it was also assessed, which effectively ensured the government's network security at the operator level. Through the formulation and implementation of the Company's Computer Information Network Security Management System, the information security in the daily operation process is ensured. By putting a wall on the network information security system of government agencies, the staff's awareness of network security can be improved and the normalization of network information security can be formed.

Third, supervision is in place.

The township network security leading group, together with the township discipline inspection commission, took the opportunity of building the style of mass line practice education activities to pay close attention to network information security and form a high-pressure situation against network security violations. Timely stop the behavior that does not meet the requirements of network information security, timely educate the illegal operators, and give disciplinary sanctions to the responsible units and persons who cause adverse consequences, which will be recorded in personal files and linked to the evaluation, promotion and bonus of units and individuals.

Summary of network security work. Strengthen leadership and implement personnel security.

The township attaches great importance to network security. At the beginning of the year, a party committee was held to study and determine that Cao Ying, deputy secretary of the township party committee and secretary of the discipline inspection commission, was responsible for the network security work in the township, while the township party and government office specifically undertook the network security management work, and Ren Yong served as the network security officer to ensure the smooth development of the work.

Second, improve the system and strengthen technical protection.

At the beginning of the year, the township Party and Government Office responsible for network security management drafted a network security management system covering personnel management, asset management, procurement management, outsourcing management, education and training. After being examined and approved by the leaders in charge and reported to the township party Committee for research and approval, it will be issued in the form of official documents; According to the requirements of national network security policies and standards, the technical protection system and security protection measures have been established and improved. Manage all terminal computers and mobile storage media according to the decentralized management mode. Each specific manager is responsible for the implementation of computer anti-virus software installation, vulnerability repair, password setting management and other security protection measures, and the township network security office conducts supervision and inspection to ensure network security.

Third, improve the safety emergency system and strengthen publicity, education and training.

According to the requirements of the National Emergency Plan for Network and Information Security Events, a network security emergency work system has been established and improved. According to the requirements, the safety agreement was signed with the personnel in key positions, and the management measures for personnel leaving their posts were formulated. There was no major network security accident in this township this year; Through the unified organization of trade unions and self-study in their spare time, township cadres have been trained in network security knowledge, and all cadres and workers have a good awareness of network security.

Fourth, the shortcomings and difficulties in the work.

First, some cadres and workers do not pay enough attention to network security, and there are still many hidden dangers in network security, such as transmitting classified information online. Second, due to the financial shortage in my hometown, I don't have enough funds to buy hardware equipment such as password equipment, intrusion detection equipment and security audit equipment. We can only do what we can to protect the network security, but we can't completely eliminate the hidden dangers of network security.

Verb (abbreviation of verb) Next work plan and suggestion.

In the future work, the township will further strengthen the education and training of cadres and workers, and strive to avoid the occurrence of network security incidents. It is hoped that the higher authorities will increase their support for the network security of villages and towns and ensure the funds so as to better carry out their work.