What are the security problems of IT information system software?

Tags or keywords: IT information system software management software application history, enterprise management security issues, information construction strategic management, overall budget performance management, production management consulting management consulting manufacturing ERP IT information system software's survival and operation environment determines its existence and faces the following security problems: First, IT information system software must be attached to computer equipment and its storage equipment and operating system running on the computer equipment, so the security of computer hardware equipment will affect the normal operation of IT information system software. In particular, computer host failure, storage equipment failure (such as hard disk) or failure that directly affects the computer operating system, which leads to the failure of IT information system software to run normally or the computer with IT information system software to start completely. This security problem comes down to the security problem of computer hardware equipment. For this problem, we can solve it by hot backup of two computers. When one machine fails, the other machine can still run normally to support the normal service of IT information system software. Second, data and database security. IT information system software generally stores and processes data through special databases (such as ORACLE, Informix, Sybase, etc.). The database itself is an application software, and it must rely on the computer's operating system to run normally. If the operating system fails or the database software itself fails, it will lead to the loss of data processed by IT information system software. For the security problem of database software failure, we can take the data backup and recovery function provided by IT information system to deal with it. If the IT information system software has a lot of important data and the system response requires high real-time, then an independent multi-hard disk storage device should be needed to store the running data of the IT information system software in a mirror mode (such as RADID5). That is to say, when a hard disk fails, because other hard disks keep these data, it can be guaranteed that its data will not be lost. At the same time, the failed hard disk is replaced by hot plug, which does not affect the data storage at all. Third, network security. With the maturity of network technology, the complexity of enterprise scale and management, and the requirements of market competition, the current IT information system software is no longer a stand-alone application, but more a network-based application, especially because of the openness and low cost of the Internet, which has been widely used and promoted. Therefore, the network environment will also bring security problems to IT information systems. Network security includes the following categories: 1, the management of the operating system of the computer equipment (server) where the IT information system is located. Whether there is anti-virus software or special plane (it is forbidden to surf the Internet or operate privately on this special plane), if not, it is easy to be infected by network viruses and cannot provide services normally; Whether the ports not used by the operating system are closed, and whether the loopholes in the operating system are solved by timely updating and upgrading; Because these places are vulnerable to attacks by illegal users on the network, if the operating system is breached, data and system security cannot be guaranteed. At the same time, physical partitions, firewalls, IDS and other hardware devices can be used to prevent attacks. 2. Network transmission security: Data transmission on the network is easily intercepted and tampered with by illegal users. We can use SSL technology to encrypt and transmit data or super-strength encryption to ensure the security of data transmission, or use CA certificate technology to legally verify the identities of both clients and servers, or use VPN technology to build a virtual private network on the Internet, such as DDN or X.25. 3. The legitimacy and safety of customers. In order to prevent illegal customers from accessing and using IT information system, we can use user name and password to verify login, UKEY, IP restriction, fingerprint identification, CA certificate and other methods to ensure that users are legal users. Fourthly, the function and data security of IT information system. After being confirmed as a legal user, you can log in to the system, and users can access the system, application functions and related data normally. But this right is operated by the rules of post authority, function authority and data authority, that is, it can only be used under controlled and restricted conditions, in other words, it can only be authorized to use and access. In addition, for the special group of IT information system software administrators, it only involves the maintenance of the system itself and does not participate in business operations, so the system administrators' access to system business functions and data should be strictly restricted.