* Be able to establish correct action plans for different attacks.
* can ensure the system timely and rapid response.
* Be able to provide yourself and customers with a standardized and detailed training system.
*, close to the service system, zero interference to customers. * With certain monitoring technology, it can be installed in all access devices and systems conveniently, simply and easily.
* Monitoring equipment will not affect and interfere with the normal performance of existing security equipment and software, and will not introduce new security risks.
* monitoring equipment should have the ability to upgrade, and can be easily upgraded.
* Have monitoring data analysis and processing technology.
* There is a knowledge base or expert database to support emergency decision-making technology.
* Adopt system disaster recovery technology. * Advanced principle: fully master and follow the international advanced information security management and technology, and implement it systematically in the service system.
* Principle of comprehensiveness: Master the national and domestic information security standards and policies, and have sufficient strength to reflect them in the service system.
:: Master principle: there are masters or experts who can master the latest information security practice technology and prevention technology and solve problems under special circumstances.
* Team principle: the team has a clear division of labor, and the key points are prominent. All basic personnel master common service methods and solve common problems.