At present, many of our data storage and transmission and many commercial transactions are conducted through the network, so the security of the network system is very important. In many fields, cyber crime, hacker attacks, data leakage and virus damage have become important factors restricting the development of the network. So what are there? Let's have a look!
(1) The threat of information disclosure caused by weak passwords.
Because there are many application systems in the company, it is very cumbersome for employees to set passwords for various accounts, and it is not easy to remember. Therefore, many employees set the password as a simple password and don't change it for a long time. This will easily lead to information leakage, and some attackers will steal passwords and illegally enter the system to obtain system data. If important information is stolen, it will have serious consequences.
② Network and system paralysis caused by virus transmission.
The company has a large number of employees, most of whom are equipped with separate computers, and most of them have access to the Internet. Employees install anti-virus systems according to their own conditions. Because employees have different understanding of virus prevention and how to use anti-virus software, some employees can't use anti-virus system correctly, and can't guarantee the timely update of anti-virus code and virus database, which is easy to cause computer infection. Because the whole network system is very huge, there is no unified monitoring of the network, and the infected computer can not be handled in time and effectively, so the virus spreads in the network. When the number of infected machines increases, the speed of some networks or the whole network will drop sharply or even be paralyzed, resulting in many employees unable to surf the Internet normally. Some employees' computers can't work normally due to virus infection, and some computers also have problems such as computer data loss, which seriously affects the normal work of the company's employees. In addition, employees infected with the virus take up a lot of working time because of reinstalling the system, which affects their normal work.
③ VLAN is not split and lacks the ability to resist network storm.
The company's network system is huge, and many computers are on the same network segment, regardless of VLAN, so that the failure of a certain point in the network will affect an area, and even "sweep" the whole network, causing a broadcast storm and network paralysis. In addition, because there is no VLAN in the whole huge network, all computers can access each other, so computers are vulnerable to attacks from other computers and leak important information in the system. If important business information is leaked, it will cause losses to the company and have serious consequences.
④ The security of information transmission cannot be guaranteed.
With the development of enterprise informatization, e-mail has become an indispensable means of information exchange and communication in company business negotiations. However, with the increasing application of e-mail, the security problems it brings are becoming more and more serious. Because the Email Transfer Protocol (SMTP) is based on the TCP protocol, there is no security guarantee. E-mail is transmitted in clear text in the network, which is easy to be intercepted and viewed by people with ulterior motives. These problems are particularly prominent for the personnel in the core departments of the company, because the emails exchanged between them often involve the confidential information of the company, and if a leak is caused, the consequences will be unimaginable. Many companies' business contacts and market operation information are published through websites, but the website information is transmitted in plain text, which is easily intercepted by third parties during transmission. If important company information is leaked, it will cause serious losses to the company's business.
⑤ There are security risks such as loopholes in the operating system of client users.
After installing the operating system, many users can't install the patches and all kinds of software of the operating system in time, which leads to various loopholes in the system and various network security problems. Microsoft releases security vulnerability patches every month. The company has a large number of employees, some of whom are weak in safety awareness and lack knowledge about system safety. They can't install the patch of Microsoft operating system in time, which leads to many security loopholes in the client operating system, and the system is vulnerable to attacks or viruses, resulting in network interruption.
⑥ Computer naming is not standardized.
There are a large number of computers in the company network, but because the company has not formulated a unified naming standard, many computer users name them at will according to their own preferences. Once there is a computer problem, such as virus infection, it affects the normal operation of the network, and it is impossible to locate the specific computer, determine the user of the computer, and eliminate the fault in time, which affects the time to solve the problem.
⑦ User permissions are confusing.
With the deepening of information construction, more and more important information is stored in the network information system, which is more and more important for information security management. However, at the beginning of the system design, due to the lack of information and the lack of effective management of authority control, many users can access or change information that is inconsistent with their own authority. At the same time, due to lax authority management, some important information was stolen by illegal users, which caused hidden dangers in information system security.
;