Traditional Culture Encyclopedia - Traditional stories - What are the information security protection methods?
What are the information security protection methods?
1, physical environment safety: measures such as computer room access control, regional video monitoring, fire prevention, waterproof, lightning protection and anti-static.
2. Identity authentication: two-factor identity authentication, identity authentication based on digital certificate, identity authentication based on physiological characteristics, etc.
3. Access control: physical access control, network access control (such as network access control NAC), application access control and data access control.
4. Audit: physical audit (such as access control and video surveillance audit), network audit (such as network audit system and sniffer), application audit (realized during application development) and desktop audit (recording the modification, deletion and configuration of files and system equipment in the host).
- Related articles
- Chinese painting suitable for primary school students
- What are the holiday customs, characteristic houses, folk handicrafts and special foods and medicines of the Han nationality? Urgent! Help me! Reward 100 points.
- How to adjust the controller of the refrigerator?
- What are the leading stocks in the data center?
- What are the customs of the Buyei people?
- Table of Contents for Unknowable General Knowledge of Chinese Traditional Culture
- Practice of Shanxi Copper Hotpot Soup
- When was the first wooden body?
- Why the country to promote water-soluble fertilizer Advantages of water-soluble fertilizer and the correct way to use it
- How to choose lamps correctly in the design of home decoration main lights. What skills do you need to master?