Due to the confidentiality of e-government, the security of e-government system engineering needs all kinds of information security technologies and products with independent intellectual property rights, and it is the need of e-government security to comprehensively promote the independent research and development and innovation of these technologies and products. These products and technologies can be divided into six categories:
Basic categories: risk control, architecture, protocol engineering, effective evaluation, engineering methods;
Key categories: password, security foundation, content security, antivirus, IDS, VPN, RBAC, strong audit, border security barrier.
Leave;
System category: PKI, PMI, DRI, network early warning, integrated management, PMI;
Application catEGories: EC, eg, NB, NS, NM, WF, XML, CSCW;; ;
Physics and environment: TEMPEX, physical appraisal;
Foresight: immune technology, quantum cryptography, drift technology, semantic understanding and recognition.
2. The choice of e-government security products.
The security of the whole e-government involves the overall matching and scientific arrangement of information security products, and the product autonomy and self-control right should be fully considered in product selection.
Products can involve secure operating system, secure hardware platform, secure database, PKI/CA, PMI, VPN, secure gateway, firewall, data encryption machine, intrusion detection (IDS), vulnerability scanning, computer virus prevention tools, strong auditing tools, secure Web, secure e-mail, integrated management platform of security facilities, content identification and filtering products, secure backup, electromagnetic leakage protection, secure isolated client and secure gateway.