The network attack rampant enterprise guards against black necessary five big strategies |http://www.cshu.net day after day




                               About us 
                               Commercial cooperation 
                               Copyright declaration 
                               Contacts with us 



            Returns to the home pageArticle browsingOther columnsLands the forum


            |   The absolute &#21019;   |   |   hacker file   |   |   is newest 
            dynamically   |   
                  |  The hacker file>>invasion analysis>> network attack rampant 
                  enterprise guards against the black necessary five big 
                  strategies day after day  Printing

            The network attack rampant enterprise guards against the black 
            necessary five big strategies day after day
            Www.cshu.net  2002-9-30  fog rain village 

              when refers to the computer security, many companies thought as 
              if they have cannot see to guarantee the back wall together, may 
              sweep away all obstacles blocks any possible attack. Actually 
              otherwise. Demonstrated according to the most new safe 
              investigation, in 2002 the first half year occurs the hacker 
              attack rose 32%, average each week each company has been attacked 
              32 times, what too bad was unexpectedly has the massive companies 
              simply not to realize oneself has been once attacked. 
               
              the Internet in gets up the revolutionary help after the 
              enterprise, also brings some own loopholes. At present has 85% 
              enterprise to exist safely leaks, but therefore suffers to the 
              economic loss enterprise has 64%. Because the computer attack 
              causes the total losses amount to 1.2 billion US dollars every 
              year. 
               
              protection enterprise security therefore appears extremely 
              importantly. Here introduced in a big way protects your enterprise 
              safety five to guard against the black strategy: 
               
              1. Must fully realize faces in exterior danger to you, and 
              therefore establishes set of security policies; 
              so-called knows oneself and the other side, is undefeated in 
              many battles. Only has in exterior danger which the full 
              understanding faces, and knows from A to Z to the dangerous 
              gravity, can achieve effectively protects oneself. But in the 
              reality all enterprises face the danger is not common. Each 
              enterprise all has the loophole and the security hidden danger 
              which oneself is in sole possession of. 
               
              gradually extends along with the enterprise network to the 
              supplier, the customer and the partner, exterior threat varies 
              directly day by day seriously. This causes the network security to 
              have to obtain more attention in each enterprise, when makes 
              certain decisions-making, must have a higher priority. Exterior 
              threat mainly refers has not been authorized the user, like the 
              hacker, the malicious destroyer and the network steal the member 
              and so on, some computers lack the safekeeping of security the 
              network user to give these not to be authorized the user by the 
              opportunity to be exploited. 
               
              the majority enterprise has not realized internal threat mainly 
              was to leaves job staff's management is improper, causes them 
              after to leave the enterprise still to be able to visit the 
              company network. Moreover, the enterprise also must consider 
              because of the equipment breakdown and the natural disaster, if 
              the fire, the flood disaster and the accidental matter ancient 
              place bring danger. 
               
              2. Seeks help the specialized security company, pursues security 
              weak hole which the enterprise exists. 
              sometimes, pursues the enterprise weak hole to look for a needle 
              in a haystack on the picture is same. Certainly is not all threats 
              very is all obvious, specially when you do not have the specialty 
              when information technology expert. Distinguishes the latent 
              threat one method is seeks help the third party, purchases the 
              security hardware or software when you, lets them carry on the 
              scanning appraisal to your enterprise's computer system, finds out 
              whether has the loophole. 
               
              in the present market many securities product can carry on to 
              the entire system completely scans, this is advantageous to the 
              manager recognition and the patching security loophole, 
              simultaneously adopts the measure solution existence the security 
              problem. 
               
              3. Guarantees the fixed asset the security 
              in the enterprise installs the alarm system to guards against 
              exterior thief to have the certain function, but is unable to 
              prevent the internal personnel to open the computer to take the 
              memory or the motherboard. Therefore, the business management 
              personnel may purchase some not too expensive security tool, if 
              the metal comparatively examines the electric wire and the 
              padlock, it may prevent disassembles or moves the machine. At the 
              same time, may on the machine the placard security label, when the 
              machine by the robber, facilitates the police to search its 
              legitimate &#25317;. 
               
              4. Guard computer virus 
              the picture "Mei Lisha", "Bill Clinton", "loves the insect" and 
              so on the virus, once caused the global more than ten million US 
              dollar losses in the past several years. With majority safe threat 
              similar, they already attack the small company, also can attack 
              the big company. Must prevent viral the attack, not merely is 
              installs &#26432;Ը software then everything is fine such to be simple. 
              Must guarantee exempts the viral invasion, does not lose the data, 
              you must unceasingly promote, unceasingly have the patch for the 
              loophole. 
               
              5. Ceases slightly violates some securities to be wrong, do not 
              have to leave behind the handle for the hacker. 
              many hackers only attack the big company stem from the moral 
              reason, but they certainly are not are not willing in the ability 
              to be able and in the scope makes slightly chaotic, they the user 
              all are actually clearer than its computer in thing. 
               
              Federal Bureau of Investigation has listed below some users 
              after habitual criminal's mistake: 
              (1), the operating system and the application procedure tacitly 
              approves the installment; 
              (2), the password establishes is improper, some 40% person use 
              "password" makes the password; 
              (3), data backup incompletely; 
              (4), turns on the nonessential port; 
              (5), the transmission and the receive data packet does not carry 
              on filters. 
               
              you may take some preventive measures to strengthen the business 
              computer system the security: 
              (1), helps you using password management software the staff to 
              choose the secure good password, must establish expired as to the 
              time too long password. 
              (2), unifies the password and the examination, establishes one 
              kind of highly effective authentication system. 
               
              finally must say, the above method although cannot guarantee you 
              prevented any hacker attacks, but at least plays the certain 
              prevention role. Will knock your gate when the next time hacker, 
              you might keep them out him.


              Original author: Tice 
              Origin: Safechina 
              Altogether has 66 readers to read this article 

              [Tells friend] 
            Previous article:Based on loophole scanner main engine security 
            policy 

            Next article:"Google" eats the red card China search alliance to be 
            taken to the threshing ground 

            - this week popular article - related article 
            The network attack rampant enterprise guards against the black 
            necessary five big strategies day after day
            Uses the reverse connection the method to bypass the firewall 
            control interior main engine



      CSHU 
