Home  >  Article  >  System security management mainly includes daily maintenance of the system, users and permissions, operation audits, etc., right?

System security management mainly includes daily maintenance of the system, users and permissions, operation audits, etc., right?

(*-*)浩
(*-*)浩Original
2019-10-25 15:23:4415401browse

System security management is an important part of management work. Its main purpose is to establish system security program requirements, ensure the implementation and completion of system security tasks and activity plans, and make them consistent with comprehensive system program requirements.

System security management mainly includes daily maintenance of the system, users and permissions, operation audits, etc., right?

System security management comprehensively considers all aspects of security issues, comprehensively analyzes the entire system, and gives special emphasis to the interfaces of each subsystem in the system. Applying system security management in the early stages of the system life cycle will yield the greatest benefits. (Recommended learning: web front-end video tutorial)

System security management is mainly to minimize event losses under given conditions and minimize the risk of damage due to security issues. Modifications made to a running system. System security management records, communicates and completes tasks determined by management by formulating and implementing system security program plans to achieve predetermined security goals.

Main goal

The main goal of system security management is to achieve the greatest degree of security and ensure management under the condition that tasks and program requirements are consistent. The department can fully understand the remaining risks before making decisions on testing, manufacturing, and operation, so that they can be taken seriously when making decisions.

Main Phases

The four main phases of system security management are:

1. In the planning stage, the system goals and system safety tasks are determined, and methods to achieve the goals are determined. These are appropriately formulated based on information such as system characteristics, complexity of the hardware part, unit cost, development process, program management structure, importance of the hardware part to safety, etc. System safety procedures are planned and periodically checked and modified as necessary during operation.

2. The organizational phase determines who will perform the tasks and manages the allocation of tasks and activities. These tasks include: identifying and evaluating potential critical safety areas; establishing safety requirements; controlling and eliminating decisions related to hazards and risk assessment; and collecting hazard and risk information. Communication and records; review and audit of safety procedures, etc.

3. In the guidance stage, when allocating power, the different responsibilities of each department are mainly considered. The grassroots management department is mainly responsible for completing most of the security tasks in a timely manner, while the system security management department is responsible for system security tasks and making the senior management departments aware of the remaining risks. Wise management decisions should be based on a full understanding of risks. Therefore, risk assessment should be an important component of critical point inspections, establishing links between system safety management and daily safety management procedures and direct safety issues, as well as It should be an important task in the guidance stage.

4. The control phase has four main parts: measuring the system output, comparing it with the ideal output, correcting it when there is a major difference, and continuing to work normally when it meets the requirements. If there is a significant difference between the system output and the actual output, it should be determined and implemented what safety technical measures should be used to correct it.

The above is the detailed content of System security management mainly includes daily maintenance of the system, users and permissions, operation audits, etc., right?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn