当前位置:网站首页>Promote trust in the digital world
Promote trust in the digital world
2022-07-19 07:31:00 【strut200805】
The pandemic has accelerated the digital transformation , Beyond anyone's imagination . Considering the increased network security risks brought by digital technology , What should society do to prevent cyber attacks 、 Reduce losses and enhance trust ? In this post , I will try to explain how through consciousness 、 Culture and reasonable control ( For example, implement zero trust architecture 、 Encryption and digital sovereignty , And sharing information to build a trusted partner network .
Promote trust with awareness and culture
With artificial intelligence 、 Cloud computing 、 Blockchain and the Internet of things (IoT) And other new technologies become more and more prominent in the workplace , Digital trust practitioners will need to adapt responsibly and safely . Besides , Effective safety requires skilled personnel , This is now hampered by inadequate network security skills . Individuals who have received basic training will be better able to protect their organization . For healthcare And other key infrastructure blackmail software groups , Making large-scale data leakage on the rise , Is endangering the government to protect the lives of citizens 、 The capacity for property and well-being . Some countries advocate taking some public and private security measures to deal with the dangers brought by cyber security attacks .
Strengthen trust through reasonable control
in the past , Organizations can establish reasonable defenses based on physical barriers and peripheral controls . As cloud computing and mobile computing become the norm , Strong identity based authentication is a key step to enhance trust in the digital world . Implement preventive safety control , Such as multifactor authentication 、 encryption 、 Strategies such as zero trust architecture and digital sovereignty are the basic pillars of strengthening digital trust . Besides , Companies of all sizes need to strengthen trust through reasonable control , In order to better deal with network security threats . be based on NIST Network security framework , Here I list seven areas that enterprises can focus on . Achieving these goals will greatly contribute to enhancing the organization's security posture , At the same time, it meets the regulatory compliance requirements of various countries and industries , Including the growing network security and Privacy Act .
- distinguish : An organization must be able to find and classify data anywhere it is located . These data can take many forms : file 、 Databases and big data ; Distributed in local storage 、 In the cloud and backup . Data security and compliance begin with discovering exposed sensitive data in front of hackers and auditors . Identify those that enable the organization and its stakeholders to identify sensitive data and key business processes “ Content ” and “ Location ”, Thus, appropriate safety measures can be implemented .
- Zero trust protection : Zero trust Of The slogan is “ Don't trust anyone , Always verify ”. people 、 The machine and API Should be based on their identity 、 Purpose and use context use this method for authentication . Then it can be extracted under the control of zero trust 、 transmission 、 Storage 、 Analyze and operate basic data , To produce meaningful results .
- Protect through encryption and de identification : Once an organization knows where its sensitive data is , It can apply key data leakage mitigation controls , Such as encryption or tokenization . In order to successfully protect the encryption and tokenization of sensitive data , The encryption key itself must be organized Protect 、 Management and control . Even if the data is inadvertently leaked , Once encrypted or de identified , The generated data string is nonsense in the eyes of unauthorized people , No value .
- With Digital sovereignty protection : The term refers to putting encryption and data access under your control . This eliminates the risk of regulatory non-compliance caused by sensitive data falling into the hands of others without explicit permission . Digital sovereignty promotes cloud operation , At the same time, it avoids supplier locking .
- Detect through continuous monitoring and evaluation : This enables organizations to always focus on information security 、 Vulnerabilities and threats , To support risk management decisions . To detect ongoing or recent attacks , Malicious insiders must be monitored 、 Privileged users 、APT、 Abnormal conditions of system and user behavior and other network threats .
- Respond to : By testing 、 distinguish 、 analysis 、 control 、 eliminate 、 Recover and learn to prepare for events .
- Restore business continuity and resilience : Business continuity plan (BCP)、 Event response plan (IRP) And disaster recovery plans (DRP) The implementation of can ensure that even if an accident occurs 、 Critical or abnormal operating conditions , The operation can also happen as usual .
Share Information , Build a network of trusted partners
The hacker community continues Development , Make victims of public and private sectors , It causes trillions of dollars of losses every year . In order to better understand and adapt to the changing threat situation , Organizations must share information with each other , To build a trusted partner network , And implement and develop safety baselines and policies , To strengthen the defense and response plan . for example , Hong Kong SAR government Cybersec Infohub And the latest in the United States administrative decree Call on the government and basic service providers to share information related to network security , And effectively cooperate to resist the growing threat of network attacks .
I hope the above list can help you improve your network security preparation , And provide some information about avoiding network attacks 、 Insights on steps to reduce damage and strengthen trust . therefore , To make a long story short , We need a secure digital society , And the only way to achieve this goal is through consciousness 、 Culture 、 Wise control and information sharing to build a trusted partner network .
边栏推荐
- Sword finger offer question brushing record - offer 05 Replace spaces
- Network knowledge-05 transport layer TCP
- Pytorch learning diary (4)
- V2X测试系列之认识V2X第二阶段应用场景
- Pytorch learning notes (I)
- Product Case Interviews
- Component emit Foundation
- Crawler foundation - Web page Foundation
- Fundamentals of crawlers - basic principles of multithreading and multiprocessing
- 网络知识-05 传输层-TCP
猜你喜欢

Crawler Basics - session and cookies

JS不使用async/await解决数据异步/同步问题

Pytorch learning diary (4)

wcdma软切换性能matlab仿真m,对比平均激活集数(MASN)、激活集更新率(ASUR)及呼叫中断概率(OP)三个性能指标

nodejs

Network knowledge-04 network layer ICMP Protocol

网络知识-03 数据链路层-以太网

TSN协议之安全协议(802.1Qci)的那些事儿

Review of 4121 Computer System for Data Science

Paper reading: deep residual learning in spiking neural networks
随机推荐
4. Installation and use of idea
Coursera deep learning notes
Classes and objects
Cracking Metric/Business Case/Product Sense Problems
M based on the MIMO channel capacity analysis of MATLAB, different antenna numbers are compared; Non codebook precoding SVD, GMD; Codebook precoding DFT, TXAA and spatial diversity
Freebsd12 install gnome3 graphical interface
听说今天发博客能领徽章!
正则表达式
web安全(xss及csrf)
How to open the service of legendary mobile games? How much investment is needed? What do you need?
MySQL regular expression ^ and $usage
SQL刷题总结 SQL Leetcode Review
Data protection / disk array raid protection IP segment 103.103.188 xxx
TSN协议之安全协议(802.1Qci)的那些事儿
MySQL解压版安装步骤(Windows)
Web Security (XSS and CSRF)
Review of 4121 Computer System for Data Science
【量化笔记】波动volatility相关技术指标以其含义
Nanny level one-stop service - self correlation to construct parent-child relationship (@jsonbackreference and @jsonmanagedreference solve circular dependency)
Filter filter