2012年1月1日 星期日

One is the physical layer security project evaluation. Through the communication lines

129668571673906250_66One is the physical layer security project evaluation. Through the communication lines the old republic power leveling, physical devices, computer rooms, such as security software and hardware equipment reliability and safety assessment of the situation, and build a physical security barrier; second system layer security project evaluation. Through the security configuration of operating system security assessments, and build a system layer security barrier; three is the network layer security project evaluation. ByAuthentication on the network layer, network, resource access control star wars the old republic power leveling, confidentiality and integrity of data transfer, remote access, domain name system security evaluation of the security situation, and build a network security barrier, and the application layer security project evaluation. Through the database software, Web services and business application software, rising software, firewalls and other network service system (such as TelnEt, and FTP, and RTX) application security assessments, build the application layer safety barrier; five is the management of security project evaluation. By units of the security, device management, security management system implementation, and the safety of the personnel Division of responsibilities for security assessment, and build management security barrier.

沒有留言:

張貼留言