Discussion on information security management countermeasures of port engineering construction projects?

Harbor engineering refers to engineering facilities such as ports, docks and dams built near estuaries and rivers, as well as some related supporting facilities, such as loading and unloading facilities, port access channels, water navigation facilities, etc. The construction of port engineering projects can make better use of water resources such as rivers, seas, rivers and lakes. In order to improve the quality and strengthen the management of port engineering construction, measures must be taken to ensure information security. This paper will introduce the specific measures to ensure information security in port projects from three aspects: mobile storage equipment management, paper document management, office equipment and field equipment management.

The development of information technology has had a variety of influences on human society, which are reflected in various industries and fields. Information security is very important for port engineering construction. Information security includes confidentiality, authenticity, integrity and security. The implementation of information security management can prevent the secrets of construction projects and construction units from leaking, improve the efficiency and quality of port engineering construction, and enable enterprises to obtain more economic benefits. For modern engineering construction, the carriers of various materials and data information have been transferred from paper to mobile storage devices. Various viruses, Trojans and spyware pose a serious threat to information security. In order to protect the important information in port engineering, targeted countermeasures and measures must be taken.

First, the management of mobile storage devices.

(1) Restrict external connections. External equipment or network interface [1] is needed in the process of transmitting various data and materials in port engineering. In this process, it is easy to be attacked by hackers, invade the system and steal important information and data of the harbor project. Therefore, when transmitting information and materials, the use of external devices and network interfaces should be strictly restricted. On the one hand, it is necessary to restrict the use of common external devices such as printers, recorders, optical drives and floppy drives, and implement centralized management and unified use. These devices can only be used for information transmission of port engineering and shall not be used for other purposes. Don't use the equipment should be stopped in time. At ordinary times, there should be special equipment management personnel to number the equipment and keep it separately. Apply in advance when using it, and return it in time after using it. On the other hand, it is necessary to restrain the behavior of internal personnel, not to use external equipment and network interfaces for private purposes, not to steal engineering information in the form of printing or burning, and not to violate the use norms of external equipment and network interfaces.

(2) burning. In addition to strengthening the management of external devices and network interfaces to prevent data leakage during data transmission, it is also necessary to strengthen the crackdown on illegal printing and CD burning in the intranet [2]. If you need to burn a CD for work, you must apply to the information management department and get approval before you can do it. CD burning should be carried out in a special department, and relevant departments should always track the flow of CDs to avoid using them for private purposes. For the security management of printing, the printing interface of the user's host should be shielded first to prevent users from printing privately. If you need to print, you should apply to the information management center and get permission to print in the printing department. When printing, ensure that the data will not be intercepted in the process of transmission from the computer to the printer, and the printed file shall not be read or taken away at will. The information management department should classify the confidentiality level of documents according to their value, formulate printing standard clauses respectively, and implement refined management of information.

(3) storage equipment. In the process of port engineering construction, many construction units and departments need to transmit information through floppy disks, floppy disks and optical disks. Once these carriers are lost, stolen or damaged, it is easy to cause information leakage accidents, cause economic losses to enterprises, and even reveal corporate and state secrets. Discarded floppy disks, magnetic disks, optical disks and other storage devices still have certain magnetism, and once permanent magnetization reflection occurs, it is easy to cause the leakage of internal storage information [3]. Therefore, the port engineering information management center should control the circulation range of abandoned storage equipment, hand over the storage equipment that is no longer used to the security agency for unified decryption and destruction, and register and record it.

Second, the management of paper documents

Although the construction of seaport project has increased the dependence on mobile storage devices, it still needs a large number of paper documents to record, save and transmit all kinds of confidential information. In order to ensure the information security of port engineering construction, it is necessary to take necessary measures to manage paper documents. First of all, it is necessary to formulate confidentiality provisions for paper documents to prevent illegal reading, illegal calling and illegal copying of documents. Secondly, when making paper documents and paper documents, waste appliances such as draft paper, carbon paper, forms and calculus paper should not be discarded at will, and should be destroyed in strict accordance with the confidentiality provisions to avoid data leakage. Finally, the circulation scope and procedures of documents and materials should be strictly regulated. At the same time, all kinds of public media reports should also be audited to avoid confidential information being made public.

Third, the management of office equipment and field equipment

(1) Management of office equipment. The port engineering information management department should divide the computer equipment used in the office into confidential and non-confidential categories. Confidentiality must be registered, and personnel shall be assigned to carry out special management according to the number. It is forbidden to store confidential information unless it is confidential. Information security management should comprehensively consider the hidden risks behind the information management system from the perspectives of information technology, security management strategies and security management measures. The information management department needs to monitor the working status, especially the confidential working status, and audit the data transmission and information exchange between the internal network of the project and the internal and external networks of the project through network software. In addition, the information management software should also record the operations of all staff and users, send out alarm signals when risks occur, and leave records when illegal operations occur, so that staff can obtain evidence.

(2) Management of field equipment. With the development of information technology, the means of information transmission have become diversified, so the possibility of information leakage has also increased, which has brought difficulties to information security management. In this regard, the information management department of port engineering needs to be vigilant to prevent it from falling into some artificial traps of information systems, equipment and components. For example, some information products and construction equipment imported from abroad may have "traps" and information will be leaked during use. This requires a strict technical review and safety review of the equipment before construction, and an emergency treatment plan is formulated for this "trap". In addition, during the construction of the port project, necessary measures should be taken to protect the communication within the project. Such as encrypting communication signals or shielding external signals.

Four. conclusion

The construction of port engineering can make better use of China's water resources and promote the economic development of coastal areas. There has been a trend of informatization in China's engineering construction, and the storage and transmission of data, materials and information have begun to change from paper form to electronic form. In order to protect the secrets of enterprises and countries and improve the efficiency and quality of port engineering construction, it is necessary to strengthen the information security management of port engineering. In this regard, it is necessary to set up a special information management department to strengthen the management of mobile storage equipment, paper documents, office equipment and venue equipment, and formulate rules and regulations and specific measures for information security management.

For more information about project/service/procurement bidding, and to improve the winning rate, please click on the bottom of official website Customer Service for free consultation:/#/? source=bdzd