2. This system not only brings business problems, but also is very unsafe, and it is easy to reveal relevant internal information of the enterprise. Therefore, we should first organize our work in information security. At the same time, re-analyze the business processes and information requirements of various departments, set up functional modules in strict accordance with the processes, and realize information integration and process optimization.
This question can be consulted in books, and there are standardized answers.