当前位置:网站首页>Network information system emergency response
Network information system emergency response
2022-06-11 13:09:00 【Xiao Wang is not serious】
Network information system emergency response
Network security emergency response mainly provides a mechanism , Ensure that the assets can obtain professional personnel in time when they are attacked 、 Security technology and other resources , And ensure that the work can be carried out efficiently and orderly according to the established procedures in case of emergency , Protect network services from further infringement , Or the business system can be recovered as soon as possible after the network assets have been destroyed , Reduce business losses .
China's emergency response organization
CNCERT/CC Founded on 2001 year 8 month , The home page is http://www.cert.org.cn/, The main responsibility is to coordinate the emergency response teams for computer network security incidents in China , Jointly handle security emergencies on the national public telecommunications infrastructure network , For the national public telecommunications infrastructure network 、 The main national network information application systems and key departments provide computer network security monitoring 、 early warning 、 meet an emergency 、 Prevention and other security services and technical support , Collect in time 、 verify 、 Summary 、 Release authoritative information about internet security , Organize domestic computer network security emergency organizations to conduct international cooperation and exchanges .

His work content is as follows :
- information acquisition
- Event monitoring
- Event handling
- Data analysis
- Resource building
- Security Research
- Safety training
- Technical consulting
- International exchange
Emergency response stage
Preparation stage
The main work in the preparation phase includes establishing a reasonable defense / Control measures , Establish appropriate policies and procedures , Obtain necessary resources and establish an emergency response team .
Detection phase
Preliminary actions and responses shall be made in the detection stage , According to the obtained preliminary materials and analysis results , Estimate the scope of the event , Develop further response strategies , And retain evidence that may be used in judicial proceedings .
Inhibition stage
The purpose of suppression is to limit the scope of the attack . Containment measures are important , Because too many security incidents can lead to rapid loss of control .
The eradication stage
After the event is suppressed , By analyzing the results of malicious code or behavior , Find out the root cause of the incident and completely eliminate it .
Recovery phase
The goal of the recovery phase is to completely restore all the broken systems and network devices to their normal task state .
Report and summary stage
The goal of this stage is to review and sort out various relevant information about the event , Document everything as much as possible . The contents of these records , It is not only of great significance to other handling work of relevant departments , And it is also a very important accumulation for the development of emergency work in the future .
Windows System emergency response methods
- Unplug the cable , Turn off the wireless network
- see 、 Comparison process , Find the problem process
- see 、 Compare ports , Find the port that caused the problem
- View the program corresponding to the open port
- see 、 Compare registry
- Check the logs of other security tools
Computer crime forensics
- Comparative analysis techniques
- Keyword query technology
- Data recovery technology
- File fingerprint feature analysis technology
- Residual data analysis technique
- Data analysis technology of disk storage free space
- Backup files to disk 、 Image file 、 Swap file 、 Temporary document analysis technology
- Analytical techniques for documentation
- Intrusion detection analysis technology
- Trap technology
边栏推荐
- Flink 从实时计算到流式数仓,下一步去往哪里?
- Explain in detail the differences between real participation formal parameters in C language
- 想要实现在时序场景下“远超”通用数据库,需要做到哪几点?
- CS structure and BS structure
- .net core 抛异常对性能影响的求证之路
- 微软再曝“丑闻”:在办公室看 VR 黄片,“HoloLens 之父”即将离职!
- /usr/bin/gzip: 1: ELF: not found /usr/bin/gzip: 3: : not found /usr/bin/gzip: 4: Syntax erro
- . 5 string
- How does Cassandra, an open source database giant, tell a "new story" in China? Face to face
- PKI/TLS瑞士军刀之cfssl
猜你喜欢
随机推荐
The tree (AVL, 2-3-, red black, Huffman)
Gb28181 protocol has become the mainstream in the market. How to choose the appropriate security monitoring video solution?
[clearos] install the clearos system
苹果将造搜索引擎?
On the life extension of distributed locks -- redis based distributed locks
Does it affect children to wear Bluetooth headsets? How to protect children's ear health
kubernetes 证书合集
分页浏览后搜索无数据
五年官司终败诉,万亿爬虫大军蠢蠢欲动
Application of "knowing things by learning" behavior time series modeling in the identification of social drainage black production
From real-time computing to streaming data warehouse, where will Flink go next?
QQ pulls up Alipay H5 payment function
Chapter V data type (IV)
关于#php#的问题:php写的原来的部署环境是在phpstudy里面进行部署的,php+MySQL+Apache但是由于每次都得保证电脑开着
Will Apple build a search engine?
【接口】看接口路径 查接口
How can mechanical equipment manufacturing enterprises manage outsourcing with the help of ERP system?
求你了,不要再在对外接口中使用枚举类型了!
Audio adaptation of openharmony Standard System Porting
Is Zhima Z1 projector really easy to use? How about the actual effect?








