当前位置:网站首页>Content Audit Technology
Content Audit Technology
2022-07-01 13:13:00 【Bad bad -5】
Content audit demand background
- Network security law requires
- Make clear who is responsible
- Establish internal safety management system and operation procedures , Implement safety protection responsibilities
- Take preventive and protective measures
- Prevent computer viruses and network attacks 、 Network intrusion, etc
- monitoring 、 Record and keep a log
- Take monitoring 、 Record network operation status 、 Technical measures for network security incidents , And keep relevant network logs for no less than six months
- data classification 、 Backup and encryption
- data classification 、 Important data backup and encryption measures
- Other legal obligations
- law 、 Other obligations stipulated by administrative regulations
- law 、 Other obligations stipulated by administrative regulations
- Make clear who is responsible
Online behavior audit framework

Online behavior audit technology
- The log center will record all audit actions
- Log query includes all behavior queries 、 Visit the website to inquire 、 Instant chat log query 、 mail 、 Post 、 Send Weibo and other log queries , It can trace all kinds of violations of organizational regulations
- According to the specified time 、 user 、 Group 、 Application, etc. to query logs
- Statistical analysis can be used for flow analysis 、 Duration analysis 、 User behavior analysis 、 Compliance analysis, etc . And can automatically generate reports , Subscribe to
Outgoing email audit technology
- Between the client and the mail server, we usually use IMAP/POP3 agreement , Between the web version and the mail server, we usually use HTTP agreement
- Between the mail server and the mail server SMTP agreement
- For emails from different manufacturers ,SangFor All know the encapsulation structure of mail , So you can clearly record the email receiving and sending mailbox 、 The theme 、 Content 、 Accessories, etc.
- Only messages sent in clear text , You can audit
- Only messages sent in clear text , You can audit
SSL Content decryption technology
HTTPS agreement
- be based on SSL Transmission of HTTP agreement , The port used is TCP Of 443 port
- Workflow
- Client to DNS The server queries the target domain name IP Address
- Client and server pass 3 The second handshake establishes TCP Connect
- The client initiates... To the server Client-Hello message
- Carry all encryption algorithm versions supported by the local client
- Server-Name: Tell the server the domain name to access
- The server returns the client Server-Hello message
- The server will choose the highest version of encryption algorithm supported by both sides , Notify the client
- The client asks the server for a certificate
- The server sends a digital certificate to the client
- The server asks the client for the certificate ( Optional , Used for bidirectional encryption )
- The client sends a digital certificate to the server ( Optional )
- The client is protected by the server public key , Negotiate symmetric keys with the server
- The client and server are protected by symmetric keys , Conduct HTTP transmission
- Client and server through 4 Second wave , end TCP Connect
- HTTPS Authentication mode
- Single validation : The client needs to verify the identity of the server , But the server does not need to verify the identity of the client
- Two way verification : The client needs to verify the identity of the server , The server also needs to verify the identity of the client
SSL Content recognition principle
- AC Crawl client's Client-Client package , By identifying Server-Name Field , To get the address of the server
- AC Fake it as a server , Negotiate encryption with the client , And forge certificates , Send to client
- AC At the same time, fake the client , Negotiate encryption with the server , And request to obtain the certificate of the server
- AC The data sent by the client and server can be decrypted at the same time
- because AC The certificate sent to the client is forged , So the client opens HTTPS Website time , The browser will display a certificate alarm
- You can trust on the client AC Certificate , To eliminate the browser certificate alarm

- about AC Certificate issued , The client can download and install manually , It can also be done through AC Configuration of , When enabling users to access the Internet , The installation certificate is mandatory
- Even if it's HTTPS Encrypted mail , It can also be done through SSL The middleman hijacked , Audit the contents of the email
Web Keyword filtering technology
- Through the Internet access policy “Web Keyword filtering ”, To prohibit the search or outgoing of some keywords
- If it is an outgoing email / post / Weibo contains filtering keywords , Need to open HTTP Upload identification
- If you search for keywords through search engines , And is HTTPS Website , It also needs to be turned on SSL Content identification , And you need to add the domain name of the website to AC In the identification Library
- except Web Keyword recognition filtering , You can also filter the file types uploaded and downloaded
IM Chat content audit technology
- Because the chat content is a private protocol , It will not conduct packet capturing audit in real time
- SangFor Through plug-in , It will be found on the client computer QQ Local cache database of chat content ,AC Every interval 10s Read the chat content in the database of the client , Write to AC The log center of
- Can each PC Install the access plug-in manually , Also can be AC Distribute uniformly through strategies
- Access procedures only support Windows PC Install on run , For non Windows user , The client plug-in cannot be installed
- Policies can be configured for terminals that do not support admission , Directly allow or prohibit the Internet
【AC Content audit experiment 】
All of the above are original , If unknown or wrong , Please point out .
边栏推荐
- R language uses conf of yardstick package_ The mat function calculates the confusion matrix of the multiclass model on each fold of each cross validation (or resampling), and uses the summary to outpu
- Meta enlarge again! VR new model posted on CVPR oral: read and understand voice like a human
- 快速整明白Redis中的压缩列表到底是个啥
- Localtime can't re-enter. It's a pit
- In the next stage of digital transformation, digital twin manufacturer Youyi technology announced that it had completed a financing of more than 300 million yuan
- Vs code setting Click to open a new file window without overwriting the previous window
- Which securities company has a low, safe and reliable account opening commission
- 1553B environment construction
- Ikvm of toolbox Net project new progress
- There are risks in trading
猜你喜欢

Simple two ball loading

一款Flutter版的记事本

Different test techniques
![[development of large e-commerce projects] performance pressure test - basic concept of pressure test & jmeter-38](/img/50/819b9c2f69534afc6dc391c9de5f05.png)
[development of large e-commerce projects] performance pressure test - basic concept of pressure test & jmeter-38

波浪动画彩色五角星loader加载js特效
![[encounter Django] - (II) database configuration](/img/13/9512c1e03349092874055771c3433d.png)
[encounter Django] - (II) database configuration

ZABBIX 6.0 source code installation and ha configuration

JS变色的乐高积木
![leetcode:241. Design priority for operation expression [DFS + Eval]](/img/d0/8dedeba7ecedccd25e0e3e96ff3362.png)
leetcode:241. Design priority for operation expression [DFS + Eval]

The popular major I chose became "Tiankeng" four years later
随机推荐
Judea pearl, Turing prize winner: 19 causal inference papers worth reading recently
科学创业三问:关于时机、痛点与重要决策
Apache-atlas-2.2.0 independent compilation and deployment
Who should I know when opening a stock account? Is it actually safe to open an account online?
Topic 2612: the real topic of the 12th provincial competition of the Blue Bridge Cup in 2021 - the least weight (enumerating and finding rules + recursion)
CV顶会最佳论文得主分享:好论文是怎么炼成的?
Operator-1初识Operator
不同的测试技术区分
Tencent always takes epoll, which is annoying
Report on the "14th five year plan" and scale prospect prediction of China's laser processing equipment manufacturing industry Ⓢ 2022 ~ 2028
oracle cdc 数据传输时,clob类型字段,在update时值会丢失,update前有值,但
声明一个抽象类Vehicle,它包含私有变量numOfWheels和公共函数Vehicle(int)、Horn()、setNumOfWheels(int)和getNumOfWheels()。子类Mot
Introduction to reverse debugging PE structure input table output table 05/07
SQLAlchemy在删除有外键约束的记录时,外键约束未起作用,何解?
波浪动画彩色五角星loader加载js特效
高薪程序员&面试题精讲系列118之Session共享有哪些方案?
Colorful five pointed star SVG dynamic web page background JS special effect
Flutter SQLite使用
1553B环境搭建
【牛客刷题-SQL大厂面试真题】NO2.用户增长场景(某度信息流)