MENU service case
 Website construction website design Beijing website construction high-end website production company Shangpin China
We create by embracing change
360 ° brand value__
simplified Chinese character
Simplified Chinese English

Shangpin China Joins Hands with Beisheng Internet to Create a New Chapter in Website Construction

Type: Shangpin Dynamic Learn more

Operation management of enterprise intranet

Source: Shangpin China | Type: website encyclopedia | Time: August 18th, 2014
If the managers and users of the intranet think that they can sleep without priority as long as they can prevent the uninvited visitors from accessing their network, it is self deception. In the face of the vulnerability of network security Website Design In addition to increasing the security service function and improving the security and confidentiality of the system, the leaders of the computer application department must also make great efforts to solve the problems of strengthening network security management and personnel recruitment.

1、 Establish and improve safety management system
At the beginning of intranet construction, security management should be considered carefully from the following aspects as an integral part of system requirements.

(1) Divide the security level of intranet information, determine the key points of security protection, and classify the company's internal e-mail data and Internet website into ① top secret level, such as the company's business status report, Ordering and shipping prices, the company's development plan, etc., this part of the website and password are not open on the Internet, and are only available to the company's senior personnel. ② Confidentiality, such as the daily management of the company, meeting notice, etc. This part of the website and password are not open on the Internet, but only used by the company's middle level and above. ③ Secret level. Such as company profile, new product introduction and ordering method. This part of the website and password are open on the Internet for consumers to browse, but there must be a protection program to prevent hackers from invading.

(2) Determine the security measures for key security precautions ① Strengthen the network monitoring capability, strengthen the management of user accounts and passwords, eliminate the existence of accounts without passwords, avoid the use of public accounts, and promptly close expired and long-term unused accounts. ② Strengthen network security audit, record relevant security information, analyze the information obtained from tracking data and generate a report, so as to prevent potential security threats. ③ Strengthen safety alarm work. Whenever an instruction has an impact or potential threat to system security, it needs to remind the user in time. ④ Develop a complete system maintenance system. ⑤ Develop emergency measures. ⑧ Strengthen tracking and monitoring capability.

(3) When staffing, people with strong sense of responsibility, understanding of technology and principles should be selected to manage the network ① to determine all individuals who know the internal network security scheme of the unit ② Specify which individuals or units can directly access Internet resources. ③ A confidentiality contract should be signed with the network administrator to prevent him from exposing enterprise secrets when he leaves his post. ④ Formulate corresponding computer room access management system. For systems with high safety level, partition control shall be implemented to restrict staff from leaving areas irrelevant to their work. ⑤ No one is allowed to take safety related positions for a long time. ⑧ If any senior manager leaves the company, the password should be changed in time.

(4) Strengthen safety education and publicity, and increase the safety protection concept of computer system and network for managers and users ① Do not affect openness due to strengthening safety management. ② It is not allowed to increase huge system overhead and affect network interoperability by strengthening security management. ③ Safety measures shall be easy to operate and flexible. ④ The performance price ratio shall be considered for safety measures.

2、 Daily management and maintenance
The common characteristics of intranet are that there are many computer host models and other network equipment, distributed in different regions, and the quality of basic level network management personnel is low; This requires the network administrator to establish the system equipment file. Generally, a small database can be used to complete this function. Once the equipment in a certain place fails, it is convenient for online query. The database shall generally include the following contents: equipment model, manufacturer, configuration parameters, installation time, installation location, IP address, Internet access record and contents, etc. The server and client shall also record their memory, hard disk capacity and model, terminal model and quantity, multi-user card model, operating system name, database name, etc.  

(1) Manageable equipment
For some network equipment, there is generally corresponding network management software. It shall be installed in time. These software can automatically identify, display and manage the network topology. Network system node configuration and management, system fault diagnosis, display and notification, network traffic and status monitoring, statistics and analysis, network performance tuning, load balancing, etc.

(2) Non manageable equipment
For unmanageable equipment, the status shall be checked by manual operation, and regular inspection and random spot check shall be combined, so as to grasp the operation status of the network in a timely and accurate manner, and handle any fault in a timely manner.

(3) Communication practice
For internal lines, structured cabling should be used as far as possible, which can greatly reduce the network failure rate, and even if there is a failure, it is easier to eliminate it. For the leased communication line of the telecommunications department, the network administrator should make a record of the connection of the communication line. In case of failure, the network administrator should contact the telecommunications department in time to quickly restore communication.

(4) Daily management and maintenance of software
The management and maintenance of software mainly includes operating system and application software. Ensure the normal operation of the network and the safety of the system and data through software management and maintenance, and ensure the recovery of the system and data in an emergency to minimize the loss reporting.
Source Statement: This article is original or edited by Shangpin China's editors. If it needs to be reproduced, please indicate that it is from Shangpin China. The above contents (including pictures and words) are from the Internet. If there is any infringement, please contact us in time (010-60259772).
TAG label:

What if your website can increase the number of conversions and improve customer satisfaction?

Make an appointment with a professional consultant to communicate!

* Shangpin professional consultant will contact you as soon as possible

Disclaimer

Thank you very much for visiting our website. Please read all the terms of this statement carefully before you use this website.

1. Part of the content of this site comes from the network, and the copyright of some articles and pictures involved belongs to the original author. The reprint of this site is for everyone to learn and exchange, and should not be used for any commercial activities.

2. This website does not assume any form of loss or injury caused by users to themselves and others due to the use of these resources.

3. For issues not covered in this statement, please refer to relevant national laws and regulations. In case of conflict between this statement and national laws and regulations, the national laws and regulations shall prevail.

4. If it infringes your legitimate rights and interests, please contact us in time, and we will delete the relevant content at the first time!

Contact: 010-60259772
E-mail: [email protected]

Communicate with professional consultants now!

  • National Service Hotline

    400-700-4979

  • Beijing Service Hotline

    010-60259772

Please be assured to fill in the information protection
Online consultation

Disclaimer

Thank you very much for visiting our website. Please read all the terms of this statement carefully before you use this website.

1. Part of the content of this site comes from the network, and the copyright of some articles and pictures involved belongs to the original author. The reprint of this site is for everyone to learn and exchange, and should not be used for any commercial activities.

2. This website does not assume any form of loss or injury caused by users to themselves and others due to the use of these resources.

3. For issues not covered in this statement, please refer to relevant national laws and regulations. In case of conflict between this statement and national laws and regulations, the national laws and regulations shall prevail.

4. If it infringes your legitimate rights and interests, please contact us in time, and we will delete the relevant content at the first time!

Contact: 010-60259772
E-mail: [email protected]