Network architecture
Divide different network areas. Reliable technical isolation measures should be taken between important network areas and other network areas to build a highly available and redundant network
Communication transmission
Verification technology and password technology shall be adopted to ensure the integrity and confidentiality of data in the communication process
Trusted authentication
The system boot program, system program, important configuration parameters and communication application program of the communication device can be trusted based on the trusted root, and the dynamic trusted verification can be carried out at the key execution link of the application program. After detecting that its credibility has been damaged, the alarm will be given, and the verification results will be sent to the security management center as an audit record
Interpretation of terms
The network security domain is divided according to the server role and importance; Ensure that network bandwidth and processing capacity can meet the needs of business peak; Ensure the integrity and confidentiality of data in the communication transmission process, which can be reliably verified
Recommended products