当前位置:网站首页>Content Audit Technology
Content Audit Technology
2022-07-01 13:13:00 【Bad bad -5】
Content audit demand background
- Network security law requires
- Make clear who is responsible
- Establish internal safety management system and operation procedures , Implement safety protection responsibilities
- Take preventive and protective measures
- Prevent computer viruses and network attacks 、 Network intrusion, etc
- monitoring 、 Record and keep a log
- Take monitoring 、 Record network operation status 、 Technical measures for network security incidents , And keep relevant network logs for no less than six months
- data classification 、 Backup and encryption
- data classification 、 Important data backup and encryption measures
- Other legal obligations
- law 、 Other obligations stipulated by administrative regulations
- law 、 Other obligations stipulated by administrative regulations
- Make clear who is responsible
Online behavior audit framework

Online behavior audit technology
- The log center will record all audit actions
- Log query includes all behavior queries 、 Visit the website to inquire 、 Instant chat log query 、 mail 、 Post 、 Send Weibo and other log queries , It can trace all kinds of violations of organizational regulations
- According to the specified time 、 user 、 Group 、 Application, etc. to query logs
- Statistical analysis can be used for flow analysis 、 Duration analysis 、 User behavior analysis 、 Compliance analysis, etc . And can automatically generate reports , Subscribe to
Outgoing email audit technology
- Between the client and the mail server, we usually use IMAP/POP3 agreement , Between the web version and the mail server, we usually use HTTP agreement
- Between the mail server and the mail server SMTP agreement
- For emails from different manufacturers ,SangFor All know the encapsulation structure of mail , So you can clearly record the email receiving and sending mailbox 、 The theme 、 Content 、 Accessories, etc.
- Only messages sent in clear text , You can audit
- Only messages sent in clear text , You can audit
SSL Content decryption technology
HTTPS agreement
- be based on SSL Transmission of HTTP agreement , The port used is TCP Of 443 port
- Workflow
- Client to DNS The server queries the target domain name IP Address
- Client and server pass 3 The second handshake establishes TCP Connect
- The client initiates... To the server Client-Hello message
- Carry all encryption algorithm versions supported by the local client
- Server-Name: Tell the server the domain name to access
- The server returns the client Server-Hello message
- The server will choose the highest version of encryption algorithm supported by both sides , Notify the client
- The client asks the server for a certificate
- The server sends a digital certificate to the client
- The server asks the client for the certificate ( Optional , Used for bidirectional encryption )
- The client sends a digital certificate to the server ( Optional )
- The client is protected by the server public key , Negotiate symmetric keys with the server
- The client and server are protected by symmetric keys , Conduct HTTP transmission
- Client and server through 4 Second wave , end TCP Connect
- HTTPS Authentication mode
- Single validation : The client needs to verify the identity of the server , But the server does not need to verify the identity of the client
- Two way verification : The client needs to verify the identity of the server , The server also needs to verify the identity of the client
SSL Content recognition principle
- AC Crawl client's Client-Client package , By identifying Server-Name Field , To get the address of the server
- AC Fake it as a server , Negotiate encryption with the client , And forge certificates , Send to client
- AC At the same time, fake the client , Negotiate encryption with the server , And request to obtain the certificate of the server
- AC The data sent by the client and server can be decrypted at the same time
- because AC The certificate sent to the client is forged , So the client opens HTTPS Website time , The browser will display a certificate alarm
- You can trust on the client AC Certificate , To eliminate the browser certificate alarm

- about AC Certificate issued , The client can download and install manually , It can also be done through AC Configuration of , When enabling users to access the Internet , The installation certificate is mandatory
- Even if it's HTTPS Encrypted mail , It can also be done through SSL The middleman hijacked , Audit the contents of the email
Web Keyword filtering technology
- Through the Internet access policy “Web Keyword filtering ”, To prohibit the search or outgoing of some keywords
- If it is an outgoing email / post / Weibo contains filtering keywords , Need to open HTTP Upload identification
- If you search for keywords through search engines , And is HTTPS Website , It also needs to be turned on SSL Content identification , And you need to add the domain name of the website to AC In the identification Library
- except Web Keyword recognition filtering , You can also filter the file types uploaded and downloaded
IM Chat content audit technology
- Because the chat content is a private protocol , It will not conduct packet capturing audit in real time
- SangFor Through plug-in , It will be found on the client computer QQ Local cache database of chat content ,AC Every interval 10s Read the chat content in the database of the client , Write to AC The log center of
- Can each PC Install the access plug-in manually , Also can be AC Distribute uniformly through strategies
- Access procedures only support Windows PC Install on run , For non Windows user , The client plug-in cannot be installed
- Policies can be configured for terminals that do not support admission , Directly allow or prohibit the Internet
【AC Content audit experiment 】
All of the above are original , If unknown or wrong , Please point out .
边栏推荐
- codeforces -- 4B. Before an Exam
- Which securities company has a low, safe and reliable account opening commission
- MySQL statistical bill information (Part 2): data import and query
- Has anyone ever encountered this situation? When Oracle logminer is synchronized, the value of CLOB field is lost
- Detailed explanation of OSPF LSA of routing Foundation
- Redis exploration: cache breakdown, cache avalanche, cache penetration
- Simple Fibonacci (recursive)
- Look at the sky at dawn and the clouds at dusk, and enjoy the beautiful pictures
- 快速整明白Redis中的压缩列表到底是个啥
- Cs5268 advantages replace ag9321mcq typec multi in one docking station scheme
猜你喜欢

ZABBIX 6.0 source code installation and ha configuration

Huawei HMS core joins hands with hypergraph to inject new momentum into 3D GIS

华为HMS Core携手超图为三维GIS注入新动能

Use Net core access wechat official account development

La taille de la pile spécifiée est petite, spécifiée à la sortie 328k

be based on. NETCORE development blog project starblog - (13) add friendship link function

Nexus builds NPM dependent private database

Fundamentals of number theory and its code implementation

Project deployment is not difficult at all!

Vs code set code auto save
随机推荐
华为HMS Core携手超图为三维GIS注入新动能
Cs5268 advantages replace ag9321mcq typec multi in one docking station scheme
Idea of [developing killer]
CV顶会最佳论文得主分享:好论文是怎么炼成的?
leetcode 322. Coin Change 零钱兑换(中等)
MySQL Replication中的并行复制示例详解
Zabbix 6.0 源码安装以及 HA 配置
mysql统计账单信息(下):数据导入及查询
In the next stage of digital transformation, digital twin manufacturer Youyi technology announced that it had completed a financing of more than 300 million yuan
北斗通信模块 北斗gps模块 北斗通信终端DTU
软件测试中功能测试流程
C language learning
I spent tens of thousands of dollars to learn and bring goods: I earned 3 yuan in three days, and the transaction depends on the bill
Analysis report on the development prospect and investment strategic planning of China's wafer manufacturing Ⓔ 2022 ~ 2028
Based on the open source stream batch integrated data synchronization engine Chunjun data restore DDL parsing module actual combat sharing
The sky is blue and misty
声明一个抽象类Vehicle,它包含私有变量numOfWheels和公共函数Vehicle(int)、Horn()、setNumOfWheels(int)和getNumOfWheels()。子类Mot
Redis explores cache consistency
c语言学习
Report on the "14th five year plan" and investment strategy recommendations for China's industrial robot industry 2022 ~ 2028