Three Measures To Fill Loopholes In Enterprise System
Vulnerability management is a very important part of enterprise network security management.
Just imagine, if we live in a broken house with a lot of holes, will we feel safe?
The same is true of enterprise networks.
How can a network that is full of holes protect the safety of enterprise information and network applications?
However, loophole management is a complex job. It is not easy to do well. The author believes that we must consider the following contents in order to carry out this work.
First, network scan or host trace.
If we want to patch up the loopholes, we need to know the loopholes first before we can repair them. Therefore, the first task of vulnerability management is to trace the existing hosts and see what are the loopholes.
Now generally there are two kinds of trace ways. One is to trace the whole host of the network from a host in the network. We can use some trace tools, such as streamers, to trace all the computers in the network conveniently, and find the holes in their operating systems. If you can use the streamer trace tool, you can easily find out which hosts in the enterprise network do not set the administrator account password or simply set up a simple password (for example, 123456); you can also use this tool to trace the host's default sharing and so on.
The other is a slight sketch of the main engine. It is to install a trace tool on all hosts in the network, and then trace the host one by one. For example, now some anti-virus software, such as Kingsoft antivirus, rising star and other anti-virus software, all have their own loopholes. With these tools, our network security administrator can easily find vulnerabilities that may be attacked in the operating system.
If we use these two ways to trace the same host, we may not get the same information. Why? In fact, the network sketch is like a hacker. As for scanning our network, the information obtained may be just some relatively simple information, and because of various other limitations, it may not be all vulnerabilities. If we scan the host side, we will get more detailed information, or we may find all the loopholes we have known. It can be seen that if we can scan on the host, our administrator will know more information. Unfortunately, the operation of each operation system on the host computer is very heavy.
Therefore, we need to achieve a balance between workload and safety according to the actual situation.
The author suggests:
In the actual work, the two methods are adopted. As for the general user's operating system, the author finds out their loopholes and gives them a repair through the way of network scanning. For network application servers, such as the company's database server, file server and so on, they scan them regularly on the machine. On the one hand, servers run 24 hours a day. We can make use of task scheduling commands to scan servers at idle time, such as twelve points. In this way, the work of scanning will not affect the operation of servers during the daytime. On the other hand, servers are only a few in the enterprise, so scanning will not be very troublesome. Moreover, the security of the server is much more important than the average user's operating system. So for the server, scanning the host side is very necessary.
For the general user's operating system, only remote scanning can be carried out. As long as we scan the network, we can scan some vulnerabilities that can be scanned by hackers, Trojan horses, and then repair them. In this way, we can reduce the probability of the user's operating system being attacked by Trojan horse and virus, and improve the security of the enterprise network.
Two. When to scan
When should we scan the host? Is it once a day, or a Monday, or once a month? From an ideal point of view, of course, the higher the frequency is, the better we can find loopholes. However, we also know that both native scan and network scan consume resources, which will have a great impact on the performance of the host and network. If we use network scanning, we will occupy more network bandwidth in the process of scanning, thus reducing the efficiency of other network applications. If I pass a test, when I open the network scan, I will copy a 5M size image to a file server. It will take nearly half of the time without opening the network scan. It can be seen that if scanning is too frequent, it will greatly affect the normal operation of other network businesses. For this reason, we need to set up a reasonable scanning frequency to minimize the adverse impact on normal business while satisfying safety.
The author suggests:
The author has little research in this area, now share the author's views, please enlighten us.
1、在没有例外的情况下,笔者两个月对企业的电脑进行一次漏洞扫描。一般都是定在双月底最后一个周末,笔者会利用周五中午休息的时间,对公司的电脑进行扫描。这大概有花费两个小时的时间。而我们企业的话,中午休息一个半小时,故对于用户网络速度影响也大概只有半个小时左右。跟用户讲明白其中的原因,他们也是可以接受的。
- Related reading
- market research | Study: Who Is Still Reading These Words On Fashion Week? Critical Reviews Rush Out Of Circles.
- Today's quotation | Xinjiang Cottonseed Prices Fell Sharply 0.15-0.2 Yuan / Kg
- Today's quotation | Zheng Cotton Prices Tend To Increase, Hedging Space Opens
- Market trend | PTA Fundamentals Will Continue To Weaken In The Late Stage To Seize The Opportunity To Meet Each Other.
- Industry dialysis | Self Reliance: Why Does Zheng Cotton Futures Rebound?
- Instant news | Slim Negotiations: A New Round Of Sino US Economic And Trade Consultations Opens In Washington
- Expo News | 2019 China Textile Clothing (Philippines) Brand Exhibition Attracts Philippine Businessmen
- Industry dialysis | How Can Cotton Textile Enterprises Find New Labels In Adversity? 2019 China Cotton Textile Conference Explores Innovation, Change And Development
- Industry perspective | To Clarify The Path And Set Up A Model: The 2019 China Textile Industry Intelligent Manufacturing Conference Delivered Real Material.
- quotations analysis | The September Overall Prosperity Index: Output Growth, Circulation And Contraction, And The Prosperity Index Is Smaller Than The Index.
- Successful Agents Make Money For Every Brand.
- Brand Agent: Making Money With "Bringing Ism"
- How Do Agents Manage Outdoor Stores?
- Everyone Commented On Finding A Shopping Mall And Acting As An Agent.
- When An Agent Or Franchisee Is Found,
- How Do Agents Choose Brand Agents?
- The Secret Of Making Money By Semir Brand Clothing Agents
- Karen Walker Brand Beautiful Ladies Skirt
- DKNY Fashion Show
- Versace Brand Women'S Clothing Embodies The Style Of Mature Women.