1, through the Internet:
Mail 1) through the network system, specific and including mail system network backup, email form;
Now think of the most effective and convenient solution: use Internet behavior management equipment can effectively intercept part of this data and communicate the record;
2) through the website, BBS attachment way out;
Now think of the most effective and convenient solution: use Internet behavior management equipment can effectively intercept part of this data and communicate the record;
3) through the network location, such as FTP way out;
Now think of the most effective and convenient solution: use Internet behavior management equipment can effectively intercept part of this data and communicate the record;
4) through the remote tools, such as remote desktop to map the data on the remote machine implementation file gaiden, use of remote tools themselves file sharing way out;
Now think of the most effective and convenient solution: use Internet behavior management equipment can effectively intercept part of this data and communicate the record;
5) programmers use to write their own tools, data into only programmers can recognize package, packet way out;
Now think of the most effective and convenient solution: small file transfer is more easy, if you want to transfer a large number of or large files, needs a stable network environment and the program itself has a reliable retransmission mechanism, this is really a little difficult, can certainly do this part and will come out a large amount of data is not general programmer; There is no find a solution,
2, through the Intranet:
1) the use of bring their own laptops, mobile phones, will these equipment and office computers for internal communication, such as USB data transfer, by making use of the Internet to transmit a file sharing way 2 computer directly connected;
Now think of the most effective and convenient solution: if the enterprise can never put personal portable devices, in the entrance to entrance guard control scan individual discrepancy of portable storage devices, it can effectively control,
2) fake office computer MAC address, will bring their own portable computer, mobile phone access to the internal system, download the internal system of data to bring their own laptops, mobile phones,
Now think of the most effective and convenient solution: if the enterprise can never put personal portable devices, in the entrance to entrance guard control scan individual discrepancy of portable storage devices, it can effectively control,
3, through the computer USB, serial port and other external devices connected to the computer data coming:
1) under WINDOWS or LINUX operating system will use the computer peripherals interface data coming;
Now think of the most effective and convenient solution: easy to solve this case, the current table tube software, domain environment can be effectively controlled;
2) before the system boot will make use of computer peripherals interface data coming;
Now think of the most effective and convenient solution: easy to solve this kind of circumstance, can through the BIOS disable USB, physical plugging the USB control methods such as USB;
3) research and development personnel daily development need to use USB debugging program;
At present this kind of circumstance is the most complex, researchers must open U mouth or COM to adjustment of the development, so the above two methods can't control, because developers development using U mouth more need to read and write operations of equipment, it's impossible to be controlled; In this case, the best way is to physical isolation, this part of the research and development staff all in this area is the use of the computer can only use internal USB devices, are not allowed to bring their own USB devices, are not allowed inside the USB out of the isolation zone,
CodePudding user response:
Learning, safety is the most importantCodePudding user response:
If there is need to make and flying security, so it is necessary and employees to sign confidentiality agreement, need to rise to the legal level, technology more often is a kind of auxiliary means,CodePudding user response:
And employees to sign confidentiality agreement is a basic management measures, the measures have a certain safety awareness of the company should do, we also have to do, but that is only from a certain extent, play a deterrent effect, do not block the source,CodePudding user response:
No opinion, the title is a bit long, can't see the problem pointsCodePudding user response:
Thanks for sharing!Data security this problem, the basic can only improve management, management does not improve, how are not safe!