Hello, welcome to visit Wuxi Security Monitoring, Wuxi Monitoring, Wuxi Remote Monitoring, and the official website of Wuxi Dehang Technology Co., Ltd!

 1512008412106430.png   Service hotline 138-618-32237

 Wuxi Monitoring

technical support

Product classification

contact us

Enterprise name: Wuxi Dehang Technology Co., Ltd

Contact: Mr. Liu

Tel.: 0510-68289990

Mobile: 13861832237

Email: [email protected]

Website: nabenjixie.cn

Address: Room 1202, No. 99 Zhaoshangcheng Road, Wuxi, Jiangsu

Welcome to Wuxi Security Monitoring, Wuxi Monitoring, Wuxi Remote Monitoring - the official website of Wuxi Dehang Technology Co., Ltd!

Design principles of government network security scheme

Your current location: home page >> technical support >> Solution

Design principles of government network security scheme

Date of issue: 2019-01-05 Author: Click:

Design principles of government network security scheme

The following principles should be followed when designing and planning the security scheme of the government network system:

   1. Principle of demand, risk and cost balance analysis

For any network, absolute security is difficult to achieve and is not necessarily necessary. It is necessary to conduct practical research on a network (including tasks, performance, structure, reliability, maintainability, etc.), and conduct qualitative and quantitative analysis on the threats faced by the network and the risks that may be undertaken, and then formulate specifications and measures to determine the security strategy of the system.

   2. Principle of comprehensiveness and integrity

The viewpoint and method of system engineering shall be used to analyze the network security and specific measures. Security measures mainly include administrative legal means, various management systems (personnel review, workflow, maintenance and guarantee system, etc.) and professional technical measures (access control, encryption technology, authentication technology, attack detection technology, fault tolerance, anti-virus, etc.). A better security measure is often the result of the application of appropriate integration of multiple methods.

The position and influence of each link of computer network, including individuals (use, maintenance, management), equipment (including facilities), software (including application systems), data, etc. in network security can only be effectively and feasible measures if viewed and analyzed from the perspective of the whole system. Different security measures have different costs and effects on different networks. The computer network security should follow the overall security principle, and develop a reasonable network architecture and network security architecture according to the determined security strategy.

   3. Principle of consistency

The principle of consistency mainly means that network security issues should coexist with the work cycle (or life cycle) of the entire network, and the security architecture formulated must be consistent with the network security requirements. Safe network system design (including preliminary or detailed design) and implementation plan, network verification, acceptance, operation, etc. shall have safety contents and measures. In fact, it is easier and cheaper to consider network security measures at the beginning of network construction than to consider security measures after network construction.

   4. Principle of operability

Safety measures need to be completed by people. If the measures are too complex and require too much people, the safety will be reduced; Secondly, the adoption of measures shall not affect the normal operation of the system.


 When designing and planning the security scheme of the government network system, the following principles should be followed: 1. The principle of demand, risk and cost balance analysis is difficult to achieve absolute security for any network, and is not necessarily necessary. It is necessary to conduct practical research on a network (including tasks, performance, structure, reliability, maintainability, etc.), and conduct qualitative and quantitative analysis on the threats faced by the network and the risks that may be undertaken, and then formulate specifications and measures to determine the security strategy of the system. 2. The principle of comprehensiveness and integrity shall apply the viewpoint and method of system engineering to analyze the network security and specific measures. Security measures mainly include administrative legal means, various management systems (personnel review, workflow, maintenance and guarantee system, etc.) and professional technical measures (access control, encryption technology, authentication technology, attack detection technology, fault tolerance, anti-virus, etc.). A better security measure is often the result of the application of appropriate integration of multiple methods. The position and influence of each link of computer network, including individuals (use, maintenance, management), equipment (including facilities), software (including application systems), data, etc. in network security can only be effectively and feasible measures if viewed and analyzed from the perspective of the whole system. Different security measures have different costs and effects on different networks. The computer network security should follow the overall security principle, and develop a reasonable network architecture and network security architecture according to the determined security strategy. 3. Consistency Principle The consistency principle mainly means that network security issues should exist simultaneously with the work cycle (or life cycle) of the entire network. The security architecture developed must be consistent with the network security requirements. Safe network system design (including preliminary or detailed design) and implementation plan, network verification, acceptance, operation, etc. shall have safety contents and measures. In fact, it is easier and cheaper to consider network security measures at the beginning of network construction than to consider security measures after network construction. 4. The principle of operability: safety measures need to be completed by people. If the measures are too complex and the requirements for people are too high, the safety itself will be reduced; Secondly, the adoption of measures shall not affect the normal operation of the system. 5. Principle of adaptability and flexibility Security measures must be able to change with the changes of network performance and security requirements, and should be easy to adapt, modify and upgrade. 6. The principle of multiple protection Any security measures are not absolutely safe and may be breached. However, a multiple protection system is established, and each layer of protection complements each other. When one layer of protection is broken, other layers of protection can still protect the security of information. 7. How can the evaluability principle pre evaluate a security design and verify its network security? This needs to be achieved through the evaluation of the national network information security evaluation and certification authority. Network security is holistic and dynamic. The integrity of network security refers to the establishment of a security system, which includes the use of corresponding security equipment and corresponding management means. Safety equipment is not a single safety equipment, but a combination of several safety equipment. The dynamic nature of network security means that network security changes with the environment and time. In a certain environment, it is a secure system. When the environment changes (such as changing a machine), the original secure system becomes unsafe; In a period of time, the time of a secure system has changed (for example, today is a secure system, maybe because hackers have found a loophole in a system, it will become unsafe tomorrow), and the original system will become unsafe. Therefore, building a network security system is not a once and for all thing. According to the characteristics of the security system, we can adopt the principle of "unified planning and step-by-step implementation". Specifically, we can first make a comprehensive security system plan for the network, and then, according to the actual application of our network, first establish a basic security protection system to ensure the basic and proper security. With the increase of the types and complexity of applications in the future, an enhanced security protection system will be established based on the original basic protection system. For the establishment of the government industry network security system, we suggest that the above principles should be adopted. First, we should make an overall security plan for the entire network, and then, according to the actual situation, we should establish a security protection system based on protection detection response to improve the security of the entire network foundation and ensure the security of the application system.

  5. Principle of adaptability and flexibility

Security measures must be able to change with the changes of network performance and security requirements, and be easy to adapt, modify and upgrade.

6. Multiple protection principle

Any security measures are not absolutely safe and may be broken. However, a multiple protection system is established, and each layer of protection complements each other. When one layer of protection is broken, other layers of protection can still protect the security of information.

7. Principle of evaluability

How to pre evaluate a security design and verify its network security needs to be evaluated by the national network information security evaluation and certification authority.

Network security is holistic and dynamic. The integrity of network security refers to the establishment of a security system, which includes the use of corresponding security equipment and corresponding management means. Safety equipment is not a single safety equipment, but a combination of several safety equipment. The dynamic nature of network security means that network security changes with the environment and time. In a certain environment, it is a secure system. When the environment changes (such as changing a machine), the original secure system becomes unsafe; In a period of time, the time of a secure system has changed (for example, today is a secure system, maybe because hackers have found a loophole in a system, it will become unsafe tomorrow), and the original system will become unsafe. Therefore, building a network security system is not a once and for all thing.

According to the characteristics of the security system, we can adopt the principle of "unified planning and step-by-step implementation". Specifically, we can first make a comprehensive security system plan for the network, and then, according to the actual application of our network, first establish a basic security protection system to ensure the basic and proper security. With the increase of the types and complexity of applications in the future, an enhanced security protection system will be established based on the original basic protection system.

For the establishment of the government industry network security system, we suggest that the above principles should be adopted. First, we should make an overall security plan for the entire network, and then, according to the actual situation, we should establish a security protection system based on protection detection response to improve the security of the entire network foundation and ensure the security of the application system.  



Website: //nabenjixie.cn/news/363.html

key word: Wuxi Monitoring and Installation Company Wuxi LAN Cabling , Wuxi Security and Monitoring , Wuxi remote monitoring

Recent browsing:

  • Online Service
  • contact number
    thirteen billion eight hundred and sixty-one million eight hundred and thirty-two thousand two hundred and thirty-seven
  • Online Message
  • Mobile website
  • Online consultation
    Welcome to leave us a message
    Please enter your message here, and we will contact you as soon as possible.
    full name
    contacts
    Telephone
    Landline/mobile number
    mailbox
    mailbox
    address
    address