CN105138920A - Implementation method for safely managing intranet terminal - Google Patents

Implementation method for safely managing intranet terminal Download PDF

Info

Publication number
CN105138920A
CN105138920A CN201510458134.2A CN201510458134A CN105138920A CN 105138920 A CN105138920 A CN 105138920A CN 201510458134 A CN201510458134 A CN 201510458134A CN 105138920 A CN105138920 A CN 105138920A
Authority
CN
China
Prior art keywords
management
terminal
module
network
audit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510458134.2A
Other languages
Chinese (zh)
Inventor
梁媛
赵慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Electronic Information Industry Co Ltd
Original Assignee
Inspur Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Electronic Information Industry Co Ltd filed Critical Inspur Electronic Information Industry Co Ltd
Priority to CN201510458134.2A priority Critical patent/CN105138920A/en
Publication of CN105138920A publication Critical patent/CN105138920A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures

Abstract

The invention discloses an implementation method for safely managing an intranet terminal. Controllable management of the internet terminal is realized through ten modules including a design terminal basic management module, an asset management module, a terminal desktop management module, a terminal safety management module, a host operation and maintenance module, a patch distribution module, a safe monitoring and auditing module, a report management module, an event alarm management module and a third-party interface management modules. Compared with the prior art, the implementation method for safely managing the intranet terminal is capable of distributing safely tested patches to network users and installing in an automatic or manual manner, setting safety rules of the terminal through unified strategy management, being safely integrated and in alarm linkage with other safe equipment, and supporting a multi-stage cascade wide area network architecture; and thus, the optimal management effect is achieved.

Description

A kind of implementation method of Intranet Terminal Security Management
Technical field
The present invention relates to terminal security technology area, specifically a kind of implementation method of practical, Intranet Terminal Security Management.
Background technology
Mention network security, people will expect network perimeter security naturally, but most of security risk that actual conditions are networks all comes from inside.Convention security defence theory is often confined to the aspect such as gateway rank, network boundary (fire wall, IDS, vulnerability scanning), important safety installations roughly concentrates on machine room or Web portal place, under the monitor closely of these equipment, the security threat from network-external reduces greatly.On the contrary, the security threat from network internal terminal is but the thorny problem that numerous safety manager generally faces.
The Prevention-Security investigation of nearly 2 years shows, management more than 80% in the units such as government, enterprise and financial instrument and safety problem carry out self terminal, terminal relates generally to each user, due to its disperse, get the brush-off, security means lacks, and made terminal security become the weak link of information security system.Therefore, network security presents new development trend, and for each state enterprise network, safe battlefield progressively by the protection of core and trunk, turns to each terminal of network internal.
The rise of terminal desktop safety management technology is the increase along with network management affairs closeness, derivative as the product progressively developed of network management technology, it is associated with the defect of traditional security defensive system, being supplementing of legacy network safe precaution system, is also the important ingredient of future network safe precaution system.
Based on this, now provide a kind of implementation method of Intranet Terminal Security Management controlled in real time.
Summary of the invention
Technical assignment of the present invention is for above weak point, provides a kind of implementation method of practical, Intranet Terminal Security Management.
An implementation method for Intranet Terminal Security Management, its specific implementation process is:
Design terminal basic management, asset management, terminal desktop management, Terminal Security Management, main frame O&M, patch distribution, security monitoring audit, Report Server Management, affair alarm management, the large module of third party's interface management ten, realize the controllable management of internal network terminal, wherein:
Terminal basic management module is used for endpoint registration management, IP and MAC binding management;
Assets management module is responsible for hardware assets management and software asset management;
Terminal desktop administration module is responsible for process operation black and white lists and port controlling, the control of application program black-white-gray list, management of process protection and peripheral hardware and illegal external connection and is controlled;
The rights management of Terminal Security Management module in charge desktop password, the management of terminal antivirus software and terminal are unified fire wall and are arranged;
Main frame operation management module is used for monitoring resource and Traffic Anomaly monitoring;
Patch in patch distribution module is installed and is supported automatically and manual two kinds of modes, obtains latest patch in time by outer net patch Download Server from patch manufacturer website; After patch safety test, by patch distribution management center server, distribution and installation are carried out to the network user;
Security monitoring Audit Module is responsible for online audit, system journal audit, file protection and audit;
Statement management module provides report capability, software and hardware assets, audit information, warning, state and other situation consolidated statements is provided by different department, different operating system, there is provided multiple statement form, statement form here comprises PDF, HTML, XML, CSV;
Affair alarm administration module gathers the warning message of all inside and outside safety management events, and by warning by kind, grade classification, carries out the type of alarm of note, sound, mail, figure;
Third party's interface administration module, provides third party interface.
The process that described terminal basic management module carries out endpoint registration management is: adopt the way to manage that C/S and B/S pattern combines, comprise client and centralized management platform, when client-side program installed by the desktop computer be managed, client-side program is registered to centralized management platform, by centralized management platform, this terminal is managed, and Arp blocking-up is carried out for access network unregistered terminal, forbid that it is networked;
The process of carrying out IP and MAC binding management is: carry out binding management to MAC and the IP address of fixing IP network, and this terminal basic management module recovers its original IP address according to strategy setting after detecting IP change, or blocks its networking.
The process that described assets management module carries out hardware assets management is: automatically collect the size comprising CPU, internal memory, fdisk summation, device identification, and comprise all hardware informations of mainboard, CD-ROM drive, floppy drive, video card, keyboard, mouse, monitor, keyboard;
The process of carrying out software asset management is: all application informations of collection and identify customer end installation automatically, and this information comprises title, version, installation path, School Affairs, the information collected is uploaded to centralized management platform and manages; Also comprise the type of operating system of installation, version number and current patch situation simultaneously, and carry out gathering tube reason.
The process that described terminal desktop administration module process of carrying out runs black and white lists and port controlling is: setting is forbidden the process that performs and allowed the process that performs, client is in violation of rules and regulations comprised to the corresponding measure of log recording, warning and suspension process; Simultaneously set process run time allow access port, record comprise behavior event, IP address, MAC Address relevant information be reported to server carry out record collect evidence;
The process of carrying out the control of application program black-white-gray list is: the application program of collection be divided into and add white list storehouse, blacklist storehouse and gray list storehouse; Client guarantees to only have the application program in the white list of being trusted to allow to run, and prevents the loading of dynamic link library file in kernel, and then takes precautions against and within 1st, threaten and senior persistence threat and without the need to signature update;
The process of carrying out Process Protection management is: guard important process, prevents due to accident or thinks that reason causes important process interrupt;
The process of carrying out peripheral hardware and illegal external connection control is: adopt the control mode of hardware device drivers level to realize allowing or forbid that main frame uses USB device, serial ports, parallel port, floppy drive, CD-ROM drive, the network equipment, printing device; For registered equipment, monitor its network and connect behavior, judge whether it illegally accesses other network according to access network environment factor, find that there is when outreaching internet behavior and take warning, blocking-up, automatic shutdown operation.
The process that described Terminal Security Management module carries out the rights management of desktop password is: carry out examination of auditor and warning to the change of the Password Management authority of terminal and behaviour in service, here behaviour in service comprises Password Length, security, weak passwurd aspect, undesirable terminal is pointed out or mandatory modification disposal simultaneously, reach the object preventing virus and hacker attacks;
The process of carrying out the management of terminal antivirus software is: in unified auditing the network, the anti-virus software of terminal is installed and service condition, be forced to client and antivirus program is installed, the installation situation of monitor terminal anti-virus software, and manage accordingly, corresponding management here comprises to be installed antivirus software, to upgrade virus base, automatic distributing automatically perform viral special anti-virus tool by force;
Carrying out the setting up procedure that terminal unifies fire wall is: keeper carries out unified fire wall at centralized management platform to terminal and arranges and limit network IP and protocol access, sets up virtual terminal isolated area in network.
Described main frame operation management module is carried out monitoring resource process and is: monitor the resources occupation rate of the CPU of terminal, internal memory, hard disk and remaining space at centralized management platform, setting danger classes warning valve;
The process of carrying out Traffic Anomaly monitoring is: flow into the network of terminal at centralized management platform, to flow out and total flow carries out monitor and managment, and can add up excessive, that instantaneous delivery the is excessive at times process of generation total flow, assistant analysis produces the excessive reason of flow, exceed certain limit and carry out after certain time warning report, automatically block, Client-Prompt management, prevent reported data from too much bringing burden to network.
Described security monitoring Audit Module carry out surf the Net audit process be: carry out online access behavior auditing and control, system control with the web page access behavior of the mode of black and white lists to user; To user surf the Net access webpage audit and record;
System journal audit process is: different rights keeper audits in the daily record of centralized management platform to terminal user; Here daily record comprises Operation Log, threatens daily record, system journal;
File protection and audit process are: the defencive function providing the file in the system to terminal, software and share directory, setting access, deletion, amendment authority; Support the operation audit to setting catalogue file, comprise document creation, printing, read and write, copy, rename, delete, the record of movement, simultaneously by information reporting management information bank for inquiring about.
Described third party's interface comprises PKI/CA certification linkage interface, cooperation interface of the firewall, webmastering software linkage interface, safety management platform linkage interface.
The implementation method of a kind of Intranet Terminal Security Management of the present invention, has the following advantages:
The implementation method of a kind of Intranet Terminal Security Management that the present invention proposes, enhance the management to network computer terminal state, behavior and event, it provide fire wall, safeguard function that IDS, Anti-Virus, professional webmastering software can not provide, the blind area of their management is monitored, be expanded into a real-time controlled Intranet management platform, mode that can be automatic or manual carries out distribution and installation to the patch through safety test to the network user; By unified tactical management, terminal security rule is arranged, the integrated and alarm linkage of safety can be carried out with other safety equipment; And multi-stage cascade wide area network framework can be supported, thus reach best management effect, practical, be easy to promote.
Accompanying drawing explanation
Accompanying drawing 1 realizes schematic diagram for of the present invention.
Embodiment
Below in conjunction with the drawings and specific embodiments, the invention will be further described.
The invention provides a kind of implementation method of Intranet Terminal Security Management, as shown in Figure 1, its specific implementation process is:
Design terminal basic management, asset management, terminal desktop management, Terminal Security Management, main frame O&M, patch distribution, security monitoring audit, Report Server Management, affair alarm management, the large module of third party's interface management ten, realize the controllable management of internal network terminal.
Further, now the structure of above-mentioned ten modules and implementation procedure are described in detail:
One, terminal basic management module.
Endpoint registration manages.The way to manage that system adopts C/S and B/S pattern to combine, comprise client and centralized management platform, when client-side program installed by the desktop computer be managed, click " connection " button of client, this computing machine is just registered to centralized management platform, manages, such as, install and unload other security modules by centralized management platform to this terminal, and Arp blocking-up is carried out for access network unregistered terminal, forbid that it is networked.
IP and MAC binding management.Carry out binding management to MAC and the IP address of fixing IP network, system looks recovers its original IP address according to strategy setting after IP change, or blocks its networking.
Two, assets management module.
Hardware assets manages.Automatic collection comprises CPU, internal memory, fdisk summation, the size of device identification and other details and other hardware informations as all in mainboard, CD-ROM drive, floppy drive, video card, keyboard, mouse, monitor, keyboard etc.
Software asset management.All application informations (title, version, installation path, School Affairs etc.) that automatic collection and identify customer end are installed, upload to centralized management platform and manage by the information collected.Also comprise the type of operating system of installation, version number and current patch situation simultaneously, and carry out gathering tube reason.
Three, terminal desktop administration module.
Process runs black and white lists and port controlling.Forbid the process performed and the process allowing execution according to strategy setting, the corresponding measures such as log recording, warning and suspension process are carried out to client in violation of rules and regulations.The port allowing access when process is run can be set simultaneously, record the relevant informations such as behavior event, IP address, MAC Address simultaneously and be reported to server to carry out record evidence obtaining.
Application program black-white-gray list controls.The application program of collection is divided into and adds white list storehouse, blacklist storehouse and gray list storehouse.Client guarantees to only have the application program in the white list of being trusted to allow to run, and prevents the loading of dynamic link library file in kernel, can take precautions against and within 1st, threaten and senior persistence threat and without the need to signature update.
Process Protection manages.Important process is guarded, prevents due to accident or think that reason causes important process interrupt.
Peripheral hardware and illegal external connection control.The control mode of hardware device drivers level is adopted to realize allowing or forbid that main frame uses USB device, serial ports, parallel port, floppy drive, CD-ROM drive, the network equipment, printing device etc.For registered equipment, monitor its network and connect behavior, judge whether it illegally accesses other network according to access network environment factor, find that there is when outreaching internet behavior and can take the operations such as warning, blocking-up, automatic shutdown.
Four, Terminal Security Management.
The rights management of desktop password.Examination of auditor and warning are carried out to the change of the Password Management authority of terminal and behaviour in service (comprising the aspects such as Password Length, security, weak passwurd), undesirable terminal is pointed out or the disposal such as mandatory modification simultaneously.Reach the object preventing virus and hacker attacks.
Terminal antivirus software manages.The anti-virus software can unifying terminal in auditing the network is installed and service condition, can be forced to client if desired and install antivirus program.If needed, also can the installation situation of monitor terminal anti-virus software, and manage accordingly (as installed antivirus software, virus base of upgrading by force, automatic distributing and automatically perform viral special anti-virus tool etc.).
Terminal unifies fire wall.Keeper carries out unified fire wall at centralized management platform to terminal and arranges and limit network IP and protocol access, sets up virtual terminal isolated area in network.
Five, main frame operation management.
Monitoring resource.At centralized management platform, the resources occupation rate of the CPU of terminal, internal memory, hard disk and remaining space are monitored, setting danger classes warning valve.
Traffic Anomaly is monitored.The network of terminal is flowed at centralized management platform, to flow out and total flow carries out monitor and managment, and can add up excessive, that instantaneous delivery the is excessive at times process of generation total flow, assistant analysis produces the excessive reason of flow, exceed certain limit and after certain time, carry out that warning reports, the management such as blocking-up, Client-Prompt automatically, preventing reported data from too much bringing burden to network.
Six, patch distribution module.
Patch is installed and is supported automatically and manual two kinds of modes, obtains latest patch in time by outer net patch Download Server from patch manufacturer website; After patch safety test, by patch distribution management center server, distribution and installation are carried out to the network user.
Seven, security monitoring Audit Module.
Online access behavior auditing and control, system control with the web page access behavior of the mode of black and white lists to user; Can to user surf the Net access webpage etc. audit and record.
System journal is audited: different rights keeper audits in the daily record (Operation Log, threat daily record, system journal etc.) of centralized management platform to terminal user.
File protection and audit.The defencive function of the file during system provides system to terminal, software and the catalogue such as to share, setting access, delete, amendment authority; Support the operation audit to setting catalogue file, comprise document creation, printing, the record reading and writing, copy, rename, delete, move etc., simultaneously by information reporting management information bank for inquiring about.
Eight, statement management module.
System provides perfect report capability, can provide software and hardware assets, audit information, warning, state and other situation consolidated statements, provide multiple statement form (PDF, HTML, XML, CSV etc.) according to by different department, different operating system.
Nine, affair alarm administration module.
In event set, the warning message of all inside and outside safety management events is gathered at alert process center, and by warning by kind, grade classification, supports the type of alarms such as note, sound, mail, figure simultaneously.
Ten, third party's interface administration module.
There is provided as PKI/CA certification linkage interface, cooperation interface of the firewall, webmastering software linkage interface, safety management platform linkage interface and other third party's interface.
In ten large modules of said method design, by the environmental testing function of patch, after each patch imports after Intranet, be automatically distributed to the installation testing that selected computing machine carries out new patch, automatically carry out non-analog and automatically test.If patch does not have an impact to test computer after installing, tested calculating function is normally run, and keeper just can carry out large-area propelling movement according to mutually deserved strategy to the computing machine in network, thus improves the security of patch installation.
Tactical management center is adopted to realize managing the unified security of the inner network terminal.Strategy has several rule groups to form, rule group is an independently unit, the set of a set of similar or dependency rule, all safety management parameters that the protection of system built-in computer terminal security needs, also support that security strategy performs the management of a series of safety practices such as scope/cycle set.
Support LAN (Local Area Network) and wide area network architecture.General LAN can use a set of native system software, all devices in centralized management affiliated area; For large-scale multiple LAN (Local Area Network) or cross-region wide area network, the multizone cascade centralized management framework that native system can be used to provide, namely one or more network segment respectively has a set of terminal management system, and the statistics of the corresponding levels and warning message are transmitted to upper management system.
Above-mentioned embodiment is only concrete case of the present invention; scope of patent protection of the present invention includes but not limited to above-mentioned embodiment; claims of the implementation method of any a kind of Intranet Terminal Security Management according to the invention and the those of ordinary skill of any described technical field to its suitable change done or replacement, all should fall into scope of patent protection of the present invention.

Claims (8)

1. an implementation method for Intranet Terminal Security Management, is characterized in that, its specific implementation process is:
Design terminal basic management, asset management, terminal desktop management, Terminal Security Management, main frame O&M, patch distribution, security monitoring audit, Report Server Management, affair alarm management, the large module of third party's interface management ten, realize the controllable management of internal network terminal, wherein:
Terminal basic management module is used for endpoint registration management, IP and MAC binding management;
Assets management module is responsible for hardware assets management and software asset management;
Terminal desktop administration module is responsible for process operation black and white lists and port controlling, the control of application program black-white-gray list, management of process protection and peripheral hardware and illegal external connection and is controlled;
The rights management of Terminal Security Management module in charge desktop password, the management of terminal antivirus software and terminal are unified fire wall and are arranged;
Main frame operation management module is used for monitoring resource and Traffic Anomaly monitoring;
Patch in patch distribution module is installed and is supported automatically and manual two kinds of modes, obtains latest patch in time by outer net patch Download Server from patch manufacturer website; After patch safety test, by patch distribution management center server, distribution and installation are carried out to the network user;
Security monitoring Audit Module is responsible for online audit, system journal audit, file protection and audit;
Statement management module provides report capability, software and hardware assets, audit information, warning, state and other situation consolidated statements is provided by different department, different operating system, there is provided multiple statement form, statement form here comprises PDF, HTML, XML, CSV;
Affair alarm administration module gathers the warning message of all inside and outside safety management events, and by warning by kind, grade classification, carries out the type of alarm of note, sound, mail, figure;
Third party's interface administration module, provides third party interface.
2. the implementation method of a kind of Intranet Terminal Security Management according to claim 1, it is characterized in that, the process that described terminal basic management module carries out endpoint registration management is: adopt the way to manage that C/S and B/S pattern combines, comprise client and centralized management platform, when client-side program installed by the desktop computer be managed, client-side program is registered to centralized management platform, by centralized management platform, this terminal is managed, and Arp blocking-up is carried out for access network unregistered terminal, forbid that it is networked;
The process of carrying out IP and MAC binding management is: carry out binding management to MAC and the IP address of fixing IP network, and this terminal basic management module recovers its original IP address according to strategy setting after detecting IP change, or blocks its networking.
3. the implementation method of a kind of Intranet Terminal Security Management according to claim 1, it is characterized in that, the process that described assets management module carries out hardware assets management is: automatically collect the size comprising CPU, internal memory, fdisk summation, device identification, and comprise all hardware informations of mainboard, CD-ROM drive, floppy drive, video card, keyboard, mouse, monitor, keyboard;
The process of carrying out software asset management is: all application informations of collection and identify customer end installation automatically, and this information comprises title, version, installation path, School Affairs, the information collected is uploaded to centralized management platform and manages; Also comprise the type of operating system of installation, version number and current patch situation simultaneously, and carry out gathering tube reason.
4. the implementation method of a kind of Intranet Terminal Security Management according to claim 1, it is characterized in that, the process that described terminal desktop administration module process of carrying out runs black and white lists and port controlling is: setting is forbidden the process that performs and allowed the process that performs, client is in violation of rules and regulations comprised to the corresponding measure of log recording, warning and suspension process; Simultaneously set process run time allow access port, record comprise behavior event, IP address, MAC Address relevant information be reported to server carry out record collect evidence;
The process of carrying out the control of application program black-white-gray list is: the application program of collection be divided into and add white list storehouse, blacklist storehouse and gray list storehouse; Client guarantees to only have the application program in the white list of being trusted to allow to run, and prevents the loading of dynamic link library file in kernel, and then takes precautions against and within 1st, threaten and senior persistence threat and without the need to signature update;
The process of carrying out Process Protection management is: guard important process, prevents due to accident or thinks that reason causes important process interrupt;
The process of carrying out peripheral hardware and illegal external connection control is: adopt the control mode of hardware device drivers level to realize allowing or forbid that main frame uses USB device, serial ports, parallel port, floppy drive, CD-ROM drive, the network equipment, printing device; For registered equipment, monitor its network and connect behavior, judge whether it illegally accesses other network according to access network environment factor, find that there is when outreaching internet behavior and take warning, blocking-up, automatic shutdown operation.
5. the implementation method of a kind of Intranet Terminal Security Management according to claim 1, it is characterized in that, the process that described Terminal Security Management module carries out the rights management of desktop password is: carry out examination of auditor and warning to the change of the Password Management authority of terminal and behaviour in service, here behaviour in service comprises Password Length, security, weak passwurd aspect, undesirable terminal is pointed out or mandatory modification disposal simultaneously, reach the object preventing virus and hacker attacks;
The process of carrying out the management of terminal antivirus software is: in unified auditing the network, the anti-virus software of terminal is installed and service condition, be forced to client and antivirus program is installed, the installation situation of monitor terminal anti-virus software, and manage accordingly, corresponding management here comprises to be installed antivirus software, to upgrade virus base, automatic distributing automatically perform viral special anti-virus tool by force;
Carrying out the setting up procedure that terminal unifies fire wall is: keeper carries out unified fire wall at centralized management platform to terminal and arranges and limit network IP and protocol access, sets up virtual terminal isolated area in network.
6. the implementation method of a kind of Intranet Terminal Security Management according to claim 1, it is characterized in that, described main frame operation management module is carried out monitoring resource process and is: monitor the resources occupation rate of the CPU of terminal, internal memory, hard disk and remaining space at centralized management platform, setting danger classes warning valve;
The process of carrying out Traffic Anomaly monitoring is: flow into the network of terminal at centralized management platform, to flow out and total flow carries out monitor and managment, and can add up excessive, that instantaneous delivery the is excessive at times process of generation total flow, assistant analysis produces the excessive reason of flow, exceed certain limit and carry out after certain time warning report, automatically block, Client-Prompt management, prevent reported data from too much bringing burden to network.
7. the implementation method of a kind of Intranet Terminal Security Management according to claim 1, it is characterized in that, described security monitoring Audit Module carry out surf the Net audit process be: carry out online access behavior auditing and control, system control with the web page access behavior of the mode of black and white lists to user; To user surf the Net access webpage audit and record;
System journal audit process is: different rights keeper audits in the daily record of centralized management platform to terminal user; Here daily record comprises Operation Log, threatens daily record, system journal;
File protection and audit process are: the defencive function providing the file in the system to terminal, software and share directory, setting access, deletion, amendment authority; Support the operation audit to setting catalogue file, comprise document creation, printing, read and write, copy, rename, delete, the record of movement, simultaneously by information reporting management information bank for inquiring about.
8. the implementation method of a kind of Intranet Terminal Security Management according to claim 1, is characterized in that, described third party's interface comprises PKI/CA certification linkage interface, cooperation interface of the firewall, webmastering software linkage interface, safety management platform linkage interface.
CN201510458134.2A 2015-07-30 2015-07-30 Implementation method for safely managing intranet terminal Pending CN105138920A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510458134.2A CN105138920A (en) 2015-07-30 2015-07-30 Implementation method for safely managing intranet terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510458134.2A CN105138920A (en) 2015-07-30 2015-07-30 Implementation method for safely managing intranet terminal

Publications (1)

Publication Number Publication Date
CN105138920A true CN105138920A (en) 2015-12-09

Family

ID=54724265

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510458134.2A Pending CN105138920A (en) 2015-07-30 2015-07-30 Implementation method for safely managing intranet terminal

Country Status (1)

Country Link
CN (1) CN105138920A (en)

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105553720A (en) * 2015-12-15 2016-05-04 浪潮电子信息产业股份有限公司 Client and system with trusted operating environments
CN105871631A (en) * 2016-05-31 2016-08-17 武汉光迅科技股份有限公司 Method for finding lost IP based on SNMP
CN106130750A (en) * 2016-09-29 2016-11-16 安徽四创电子股份有限公司 A kind of big data platform upgrade method based on privately owned Yum storehouse
CN106201373A (en) * 2016-06-30 2016-12-07 北京嘉华龙马科技有限公司 A kind of method strengthening existing printer security performance
CN106970811A (en) * 2017-03-09 2017-07-21 腾讯科技(深圳)有限公司 A kind of patch file installation method and its equipment
CN107104853A (en) * 2017-03-31 2017-08-29 北京北信源软件股份有限公司 A kind of test bed system and method for testing for Terminal Security Management software
CN107644165A (en) * 2017-08-29 2018-01-30 国家电网公司 Security protection platform and safety protecting method and device
CN107682365A (en) * 2017-11-03 2018-02-09 郑州云海信息技术有限公司 A kind of cross-platform network access control system and method
CN107707571A (en) * 2017-11-15 2018-02-16 江苏神州信源***工程有限公司 A kind of method and apparatus for managing network external connection
CN107766728A (en) * 2017-08-28 2018-03-06 国家电网公司 Mobile application security managing device, method and mobile operation safety protection system
CN107766731A (en) * 2017-09-22 2018-03-06 郑州云海信息技术有限公司 A kind of anti-virus attack realization method and system based on application program management and control
CN107809433A (en) * 2017-11-06 2018-03-16 中国联合网络通信集团有限公司 Assets management method and device
CN107835094A (en) * 2017-11-10 2018-03-23 郑州云海信息技术有限公司 A kind of centralized security configuration inspection and reinforcement means
CN108319535A (en) * 2017-12-25 2018-07-24 国网河北省电力有限公司衡水供电分公司 Terminal O&M auxiliary system
CN108616383A (en) * 2018-03-26 2018-10-02 国网安徽省电力有限公司宣城供电公司 A kind of network and the security process of information manage system
CN108768732A (en) * 2018-05-31 2018-11-06 广东电网有限责任公司韶关供电局 A kind of IP Asset Visualizations management method and system
CN108989306A (en) * 2018-07-12 2018-12-11 王振达 A kind of mobile terminal safety managing and control system and implementation method
CN109033840A (en) * 2018-06-28 2018-12-18 成都飞机工业(集团)有限责任公司 The method that a kind of pair of terminal carries out censorship
CN109328469A (en) * 2016-06-20 2019-02-12 日本电气株式会社 The method of communication network device, communications network system and communication network device
CN110263008A (en) * 2019-06-20 2019-09-20 江苏满运软件科技有限公司 Terminal offline logs management system, method, equipment and storage medium
CN110260967A (en) * 2019-07-23 2019-09-20 厦门大学 A kind of high-volume weighing electronic scale that open source data-interface is provided
CN110691083A (en) * 2019-09-26 2020-01-14 杭州安恒信息技术股份有限公司 External connection blocking method based on process
CN110909365A (en) * 2019-12-03 2020-03-24 中国石化销售股份有限公司华南分公司 Security patch pushing method and device
CN111104645A (en) * 2018-10-25 2020-05-05 广达电脑股份有限公司 Software master file data management system and method
CN111176236A (en) * 2019-12-31 2020-05-19 四川红华实业有限公司 Industrial control safety protection system of centrifugal plant and safety protection operation method thereof
CN112383417A (en) * 2020-11-02 2021-02-19 杭州安恒信息安全技术有限公司 Terminal security external connection detection method, system, equipment and readable storage medium
CN113254936A (en) * 2021-07-12 2021-08-13 深圳市永达电子信息股份有限公司 Terminal safety management and control platform based on brain-like calculation
CN113391773A (en) * 2021-07-12 2021-09-14 广东医科大学附属第二医院 Printing system with independent payment function based on Internet
CN113553554A (en) * 2021-07-12 2021-10-26 国网青海省电力公司信息通信公司 Operation and maintenance system for radio stations in data
CN113810371A (en) * 2021-08-04 2021-12-17 苏州椰云科技有限公司 Safety management method for software and hardware decoupling platform
CN113992337A (en) * 2020-07-09 2022-01-28 台众计算机股份有限公司 Information security management system of multi-information security software
CN115550068A (en) * 2022-11-28 2022-12-30 天津安华易科技发展有限公司 Host log information security audit method
CN117499923A (en) * 2023-12-29 2024-02-02 南京邮电大学 Mobile terminal partition time-sharing security access method and system in transformer substation environment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130136133A1 (en) * 2010-06-22 2013-05-30 Microsoft Corporation Distributed virtual network gateways

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130136133A1 (en) * 2010-06-22 2013-05-30 Microsoft Corporation Distributed virtual network gateways

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
网友: "内网安全管理资料(北信源)", 《HTTPS://WENKU.BAIDU.COM/VIEW/10EB5C47B307E87101F696C8.HTML?PN=NAN》 *

Cited By (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105553720A (en) * 2015-12-15 2016-05-04 浪潮电子信息产业股份有限公司 Client and system with trusted operating environments
CN105871631A (en) * 2016-05-31 2016-08-17 武汉光迅科技股份有限公司 Method for finding lost IP based on SNMP
CN105871631B (en) * 2016-05-31 2019-04-09 武汉光迅科技股份有限公司 A method of it is given for change based on snmp protocol and loses IP
CN109328469A (en) * 2016-06-20 2019-02-12 日本电气株式会社 The method of communication network device, communications network system and communication network device
CN109328469B (en) * 2016-06-20 2022-03-15 日本电气株式会社 Communication network device, communication network system, and method of communication network device
CN106201373A (en) * 2016-06-30 2016-12-07 北京嘉华龙马科技有限公司 A kind of method strengthening existing printer security performance
CN106130750A (en) * 2016-09-29 2016-11-16 安徽四创电子股份有限公司 A kind of big data platform upgrade method based on privately owned Yum storehouse
CN106970811A (en) * 2017-03-09 2017-07-21 腾讯科技(深圳)有限公司 A kind of patch file installation method and its equipment
CN107104853A (en) * 2017-03-31 2017-08-29 北京北信源软件股份有限公司 A kind of test bed system and method for testing for Terminal Security Management software
CN107104853B (en) * 2017-03-31 2020-04-07 北京北信源软件股份有限公司 Test bed system and test method for terminal safety management software
CN107766728A (en) * 2017-08-28 2018-03-06 国家电网公司 Mobile application security managing device, method and mobile operation safety protection system
CN107644165A (en) * 2017-08-29 2018-01-30 国家电网公司 Security protection platform and safety protecting method and device
CN107766731A (en) * 2017-09-22 2018-03-06 郑州云海信息技术有限公司 A kind of anti-virus attack realization method and system based on application program management and control
CN107682365A (en) * 2017-11-03 2018-02-09 郑州云海信息技术有限公司 A kind of cross-platform network access control system and method
CN107809433A (en) * 2017-11-06 2018-03-16 中国联合网络通信集团有限公司 Assets management method and device
CN107809433B (en) * 2017-11-06 2020-04-07 中国联合网络通信集团有限公司 Asset management method and device
CN107835094A (en) * 2017-11-10 2018-03-23 郑州云海信息技术有限公司 A kind of centralized security configuration inspection and reinforcement means
CN107707571A (en) * 2017-11-15 2018-02-16 江苏神州信源***工程有限公司 A kind of method and apparatus for managing network external connection
CN108319535A (en) * 2017-12-25 2018-07-24 国网河北省电力有限公司衡水供电分公司 Terminal O&M auxiliary system
CN108616383A (en) * 2018-03-26 2018-10-02 国网安徽省电力有限公司宣城供电公司 A kind of network and the security process of information manage system
CN108768732A (en) * 2018-05-31 2018-11-06 广东电网有限责任公司韶关供电局 A kind of IP Asset Visualizations management method and system
CN109033840A (en) * 2018-06-28 2018-12-18 成都飞机工业(集团)有限责任公司 The method that a kind of pair of terminal carries out censorship
CN108989306A (en) * 2018-07-12 2018-12-11 王振达 A kind of mobile terminal safety managing and control system and implementation method
CN111104645A (en) * 2018-10-25 2020-05-05 广达电脑股份有限公司 Software master file data management system and method
CN110263008A (en) * 2019-06-20 2019-09-20 江苏满运软件科技有限公司 Terminal offline logs management system, method, equipment and storage medium
CN110260967A (en) * 2019-07-23 2019-09-20 厦门大学 A kind of high-volume weighing electronic scale that open source data-interface is provided
CN110691083A (en) * 2019-09-26 2020-01-14 杭州安恒信息技术股份有限公司 External connection blocking method based on process
CN110691083B (en) * 2019-09-26 2021-07-23 杭州安恒信息技术股份有限公司 External connection blocking method based on process
CN110909365A (en) * 2019-12-03 2020-03-24 中国石化销售股份有限公司华南分公司 Security patch pushing method and device
CN110909365B (en) * 2019-12-03 2022-07-05 中国石油化工股份有限公司 Security patch pushing method and device
CN111176236A (en) * 2019-12-31 2020-05-19 四川红华实业有限公司 Industrial control safety protection system of centrifugal plant and safety protection operation method thereof
CN113992337B (en) * 2020-07-09 2024-01-26 台众计算机股份有限公司 Information security management system of multi-information security software
CN113992337A (en) * 2020-07-09 2022-01-28 台众计算机股份有限公司 Information security management system of multi-information security software
CN112383417A (en) * 2020-11-02 2021-02-19 杭州安恒信息安全技术有限公司 Terminal security external connection detection method, system, equipment and readable storage medium
CN113254936A (en) * 2021-07-12 2021-08-13 深圳市永达电子信息股份有限公司 Terminal safety management and control platform based on brain-like calculation
CN113391773A (en) * 2021-07-12 2021-09-14 广东医科大学附属第二医院 Printing system with independent payment function based on Internet
CN113553554A (en) * 2021-07-12 2021-10-26 国网青海省电力公司信息通信公司 Operation and maintenance system for radio stations in data
CN113810371A (en) * 2021-08-04 2021-12-17 苏州椰云科技有限公司 Safety management method for software and hardware decoupling platform
CN115550068B (en) * 2022-11-28 2023-03-10 天津安华易科技发展有限公司 Safety auditing method for log information of host
CN115550068A (en) * 2022-11-28 2022-12-30 天津安华易科技发展有限公司 Host log information security audit method
CN117499923A (en) * 2023-12-29 2024-02-02 南京邮电大学 Mobile terminal partition time-sharing security access method and system in transformer substation environment
CN117499923B (en) * 2023-12-29 2024-03-15 南京邮电大学 Mobile terminal partition time-sharing security access method and system in transformer substation environment

Similar Documents

Publication Publication Date Title
CN105138920A (en) Implementation method for safely managing intranet terminal
CA2526759C (en) Event monitoring and management
CN104283889B (en) APT attack detectings and early warning system inside electric system based on the network architecture
US7712133B2 (en) Integrated intrusion detection system and method
CN103413083B (en) Unit security protection system
US20090271504A1 (en) Techniques for agent configuration
WO2023216641A1 (en) Security protection method and system for power terminal
EP2387746B1 (en) Methods and systems for securing and protecting repositories and directories
CN110912876A (en) Mimicry defense system, method and medium for information system
CN106656987A (en) Computer information security management system
CN109861972B (en) Safety architecture system of industrial information control integrated platform
Beigh et al. Intrusion Detection and Prevention System: Classification and Quick
CN114003943B (en) Safe double-control management platform for computer room trusteeship management
CN110033174A (en) A kind of industrial information efficient public security system building method
CN113901450A (en) Industrial host terminal safety protection system
CN113407949A (en) Information security monitoring system, method, equipment and storage medium
CN106790270A (en) A kind of safety system of cloud operating system
US11750634B1 (en) Threat detection model development for network-based systems
Tripathi et al. Paradigms for mobile agent based active monitoring of network systems
McFail et al. Detection/Engineering in Industrial Control Systems. Ukraine 2016 Attack: Sandworm Team and Industroyer Case Study
CN103841050B (en) A kind of LAN admittance control method of nuclear power plant analog machine and system
CN113254936A (en) Terminal safety management and control platform based on brain-like calculation
Luiijf SCADA security good practices for the drinking water sector
Tian et al. Arm up administrators: automated vulnerability management
CN116566747B (en) Safety protection method and device based on industrial Internet

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20151209

WD01 Invention patent application deemed withdrawn after publication