Research in Analysis IT Security Policy and Security Solution

被引:1
|
作者
Liao, Kai [1 ]
Li, Feng [1 ]
机构
[1] Lib Huazhong Agr Univ, Wuhan, Hubei, Peoples R China
关键词
Information Technology; Organisation; Security; Policy;
D O I
10.23977/meet.2019.93728
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This research paper will state the IT Security Policy, and list all of component of that. The main problem of IT security policy is from the people, mistake of staff and hacker attack, and all of this is hard to avoid. Therefore our Security Policy should include the various methods facing difference situation. For example we establish firewalls to improve the security and install Anti-Virus for every computer. Furthermore, setting different viewing permissions and the entire in-house network will be monitored by administrators. And then, build a thorough backup system by on-line database, removable drivers to save data and information completely. Even if every method all data have been destroy or the operation system clash, we can recovery because of back-up frequency is plan of policy. According the size of organisation, we can change the main policy.
引用
收藏
页码:180 / 184
页数:5
相关论文
共 50 条
  • [1] Climate change and energy security: an analysis of policy research
    King, Marcus DuBois
    Gulledge, Jay
    [J]. CLIMATIC CHANGE, 2014, 123 (01) : 57 - 68
  • [2] Climate change and energy security: an analysis of policy research
    Marcus DuBois King
    Jay Gulledge
    [J]. Climatic Change, 2014, 123 : 57 - 68
  • [3] Research on AJAX security and solution
    Wu Kai-xing
    Han Xi
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 1263 - 1265
  • [4] Security Research: Program Analysis Meets Security
    Oracle Labs, Brisbane
    QLD
    4000, Australia
    [J]. Lect. Notes Comput. Sci., (162-168):
  • [5] The sustainable security index: a new measure for research and policy analysis
    Ozaltin, Duygu
    [J]. CONFLICT SECURITY & DEVELOPMENT, 2024, 24 (04) : 317 - 338
  • [6] THE ECONOMIC SECURITY INDEX: A NEW MEASURE FOR RESEARCH AND POLICY ANALYSIS
    Hacker, Jacob S.
    Huber, Gregory A.
    Nichols, Austin
    Rehm, Philipp
    Schlesinger, Mark
    Valletta, Rob
    Craig, Stuart
    [J]. REVIEW OF INCOME AND WEALTH, 2014, 60 : S5 - S32
  • [7] Research of Security Analysis of ARBAC Policy Based on Intelligence Planning
    Liu Qiang
    Jiang Yun-Fei
    Rao Dong-Ning
    Chen Xin-Du
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 820 - +
  • [8] LEGAL POLICY AND SECURITY POLICY AS ELEMENTS OF SECURITY POLICY
    WEEDE, E
    [J]. ARCHIVES EUROPEENNES DE SOCIOLOGIE, 1984, 25 (01): : 147 - 166
  • [9] SECURITY POLICY AND EUROPEAN SECURITY
    DUCKWITZ, GF
    [J]. AUSSEN POLITIK, 1970, 21 (01): : 5 - 13
  • [10] Research and construction of dynamic awareness security protection model based on security policy
    Lu, Yiming
    Sheng, Wanxing
    Liu Riliang
    Jin, Peipei
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2017, : 202 - 207