<!doctype html><html lang dir=ltr><meta charset=utf-8><meta name=viewport content="width=device-width,initial-scale=1"><title>安全威胁课程——防护和治理 | ACSE（亚信安全认证安全专家） | Hui.Ke - Blog</title><meta name=generator content="Hugo Eureka 0.9.3"><link rel=stylesheet href=https://b.hui.ke/css/eureka.min.9cec6350e37e534b0338fa9a085bf06855de3b0f2dcf857e792e5e97b07ea905d4d5513db554cbc26a9c3da622bae92d.css><script defer src=https://b.hui.ke/js/eureka.min.fa9a6bf6d7a50bb635b4cca7d2ba5cf3dfb095ae3798773f1328f7950028b48c17d06276594e1b5f244a25a6c969a705.js></script>
<link rel=preconnect href=https://fonts.googleapis.com><link rel=preconnect href=https://fonts.gstatic.com crossorigin><link rel=preload href="https://fonts.googleapis.com/css2?family=Lora:wght@400;600;700&family=Noto+Serif+SC:wght@400;600;700&display=swap" as=style onload='this.onload=null,this.rel="stylesheet"'><link rel=stylesheet href=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/styles/vs.min.css media=print onload='this.media="all",this.onload=null' crossorigin><script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/highlight.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/bash.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/ini.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/json.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/php.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/python.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/shell.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/sql.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/x86asm.min.js crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@11.4.0/build/languages/xml.min.js crossorigin></script>
<link rel=stylesheet href=https://b.hui.ke/css/highlightjs.min.2958991528e43eb6fc9b8c4f2b8e052f79c4010718e1d1e888a777620e9ee63021c2c57ec7417a3108019bb8c41943e6.css media=print onload='this.media="all",this.onload=null'><script defer type=text/javascript src=https://lib.baomitu.com/font-awesome/6.1.1/js/all.min.js></script>
<link rel=stylesheet href=https://cdn.jsdelivr.net/npm/katex@0.15.2/dist/katex.min.css integrity=sha384-MlJdn/WNKDGXveldHDdyRP1R4CTHr3FeuDNfhsLPYrq2t0UBkUdK2jyTnXPEK1NQ media=print onload='this.media="all",this.onload=null' crossorigin><script defer src=https://cdn.jsdelivr.net/npm/katex@0.15.2/dist/katex.min.js integrity=sha384-VQ8d8WVFw0yHhCk5E8I86oOhv48xLpnDZx5T9GogA/Y84DcCKWXDmSDfn13bzFZY crossorigin></script>
<script defer src=https://cdn.jsdelivr.net/npm/katex@0.15.2/dist/contrib/auto-render.min.js integrity=sha384-+XBljXPPiv+OzfbB3cVmLHf4hdUFHlWNZN5spNQ7rmHTXpd7WvJum6fIACpNNfIR crossorigin></script>
<script>document.addEventListener("DOMContentLoaded",function(){renderMathInElement(document.body,{delimiters:[{left:"$$",right:"$$",display:!0},{left:"$",right:"$",display:!1},{left:"\\(",right:"\\)",display:!1},{left:"\\[",right:"\\]",display:!0}]})})</script><script defer src=https://cdn.jsdelivr.net/npm/mermaid@8.14.0/dist/mermaid.min.js integrity=sha384-atOyb0FxAgN9LyAc6PEf9BjgwLISyansgdH8/VXQH8p2o5vfrRgmGIJ2Sg22L0A0 crossorigin></script>
<link rel=icon type=image/png sizes=32x32 href=https://b.hui.ke/icon_hub7ca0b5404c6d576559b2bd22c64b0e5_2009_32x32_fill_box_center_3.png><link rel=apple-touch-icon sizes=180x180 href=https://b.hui.ke/icon_hub7ca0b5404c6d576559b2bd22c64b0e5_2009_180x180_fill_box_center_3.png><meta name=description content="  技术部分第四节内容，即第二章《病毒与威胁基础》之任务 5《安全威胁课程——防护和治理》"><script type=application/ld+json>{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Docs","item":"https://b.hui.ke/docs/"},{"@type":"ListItem","position":2,"name":"ACSE（亚信安全认证安全专家）","item":"https://b.hui.ke/docs/asiainfo-acse-training/"},{"@type":"ListItem","position":3,"name":"安全威胁课程——防护和治理","item":"https://b.hui.ke/docs/asiainfo-acse-training/5/"}]}</script><script type=application/ld+json>{"@context":"https://schema.org","@type":"Article","mainEntityOfPage":{"@type":"WebPage","@id":"https://b.hui.ke/docs/asiainfo-acse-training/5/"},"headline":"安全威胁课程——防护和治理 | ACSE（亚信安全认证安全专家） | Hui.Ke - Blog","datePublished":"2020-02-21T19:22:36+08:00","dateModified":"2020-02-21T19:22:36+08:00","wordCount":1027,"author":{"@type":"Person","name":"Hui.Ke"},"publisher":{"@type":"Person","name":"Hui.Ke","logo":{"@type":"ImageObject","url":"https://b.hui.ke/icon.png"}},"description":"\u003cp\u003e  技术部分第四节内容，即第二章《病毒与威胁基础》之任务 5《安全威胁课程——防护和治理》\u003c\/p\u003e"}</script><meta property="og:title" content="安全威胁课程——防护和治理 | ACSE（亚信安全认证安全专家） | Hui.Ke - Blog"><meta property="og:type" content="article"><meta property="og:image" content="https://b.hui.ke/icon.png"><meta property="og:url" content="https://b.hui.ke/docs/asiainfo-acse-training/5/"><meta property="og:description" content="  技术部分第四节内容，即第二章《病毒与威胁基础》之任务 5《安全威胁课程——防护和治理》"><meta property="og:site_name" content="Hui.Ke - Blog"><meta property="article:published_time" content="2020-02-21T19:22:36+08:00"><meta property="article:modified_time" content="2020-02-21T19:22:36+08:00"><meta property="article:section" content="docs"><meta property="article:tag" content="安全威胁"><meta property="article:tag" content="安全防护"><meta property="article:tag" content="安全治理"><meta property="og:see_also" content="https://b.hui.ke/docs/asiainfo-acse-training/9/"><meta property="og:see_also" content="https://b.hui.ke/docs/asiainfo-acse-training/8/"><meta property="og:see_also" content="https://b.hui.ke/docs/asiainfo-acse-training/7/"><meta property="og:see_also" content="https://b.hui.ke/docs/asiainfo-acse-training/6/"><meta property="og:see_also" content="https://b.hui.ke/docs/asiainfo-acse-training/4/"><meta property="og:see_also" content="https://b.hui.ke/docs/asiainfo-acse-training/3/"><meta property="og:see_also" content="https://b.hui.ke/docs/asiainfo-acse-training/2/"><meta property="og:see_also" content="https://b.hui.ke/docs/asiainfo-acse-training/1/"><script>!function(e){"use strict";!function(){var i,s=window,o=document,a=e,c="".concat("https:"===o.location.protocol?"https://":"http://","sdk.51.la/js-sdk-pro.min.js"),n=o.createElement("script"),r=o.getElementsByTagName("script")[0];n.type="text/javascript",n.setAttribute("charset","UTF-8"),n.async=!0,n.src=c,n.id="LA_COLLECT",a.d=n,i=function(){s.LA.ids.push(a)},s.LA?s.LA.ids&&i():(s.LA=e,s.LA.ids=[],i()),r.parentNode.insertBefore(n,r)}()}({id:"Jgb8aUbG5e3rqhrs",ck:"Jgb8aUbG5e3rqhrs",autoTrack:!0,hashMode:!0})</script><body class="flex min-h-screen flex-col"><header class="min-h-16 pl-scrollbar bg-secondary-bg fixed z-50 flex w-full items-center shadow-sm"><div class="mx-auto w-full max-w-screen-xl"><script>let storageColorScheme=localStorage.getItem("lightDarkMode");((storageColorScheme=="Auto"||storageColorScheme==null)&&window.matchMedia("(prefers-color-scheme: dark)").matches||storageColorScheme=="Dark")&&document.getElementsByTagName("html")[0].classList.add("dark")</script><nav class="flex items-center justify-between flex-wrap px-4 py-4 md:py-0"><a href=/ class="me-6 text-primary-text text-xl font-bold">Hui.Ke - Blog</a>
<button id=navbar-btn class="md:hidden flex items-center px-3 py-2" aria-label="Open Navbar">
<i class="fas fa-bars"></i></button><div id=target class="hidden block md:flex md:grow md:justify-between md:items-center w-full md:w-auto text-primary-text z-20"><div class="md:flex md:h-16 text-sm md:grow pb-4 md:pb-0 border-b md:border-b-0"><a href=/posts/ class="block mt-4 md:inline-block md:mt-0 md:h-(16-4px) md:leading-(16-4px) box-border md:border-t-2 md:border-b-2 border-transparent me-4">Posts</a>
<a href=/docs/ class="block mt-4 md:inline-block md:mt-0 md:h-(16-4px) md:leading-(16-4px) box-border md:border-t-2 md:border-b-2 selected-menu-item me-4">Docs</a>
<a href=/categories/ class="block mt-4 md:inline-block md:mt-0 md:h-(16-4px) md:leading-(16-4px) box-border md:border-t-2 md:border-b-2 border-transparent me-4">Categories</a>
<a href=/series/ class="block mt-4 md:inline-block md:mt-0 md:h-(16-4px) md:leading-(16-4px) box-border md:border-t-2 md:border-b-2 border-transparent me-4">Series</a>
<a href=/tags/ class="block mt-4 md:inline-block md:mt-0 md:h-(16-4px) md:leading-(16-4px) box-border md:border-t-2 md:border-b-2 border-transparent me-4">Tags</a>
<a href=/love/ class="block mt-4 md:inline-block md:mt-0 md:h-(16-4px) md:leading-(16-4px) box-border md:border-t-2 md:border-b-2 border-transparent me-4">Love</a>
<a href=/about/ class="block mt-4 md:inline-block md:mt-0 md:h-(16-4px) md:leading-(16-4px) box-border md:border-t-2 md:border-b-2 border-transparent me-4">About</a></div><div class=flex><div class="relative pt-4 md:pt-0"><div class="cursor-pointer hover:text-eureka" id=lightDarkMode><i class="fas fa-adjust"></i></div><div class="fixed hidden inset-0 opacity-0 h-full w-full cursor-default z-30" id=is-open></div><div class="absolute flex flex-col start-0 md:start-auto end-auto md:end-0 hidden bg-secondary-bg w-48 rounded py-2 border border-tertiary-bg cursor-pointer z-40" id=lightDarkOptions><span class="px-4 py-1 hover:text-eureka" name=Light>Light</span>
<span class="px-4 py-1 hover:text-eureka" name=Dark>Dark</span>
<span class="px-4 py-1 hover:text-eureka" name=Auto>Auto</span></div></div></div></div><div class="fixed hidden inset-0 opacity-0 h-full w-full cursor-default z-0" id=is-open-mobile></div></nav><script>let element=document.getElementById("lightDarkMode");storageColorScheme==null||storageColorScheme=="Auto"?document.addEventListener("DOMContentLoaded",()=>{window.matchMedia("(prefers-color-scheme: dark)").addEventListener("change",switchDarkMode)}):storageColorScheme=="Light"?(element.firstElementChild.classList.remove("fa-adjust"),element.firstElementChild.setAttribute("data-icon","sun"),element.firstElementChild.classList.add("fa-sun")):storageColorScheme=="Dark"&&(element.firstElementChild.classList.remove("fa-adjust"),element.firstElementChild.setAttribute("data-icon","moon"),element.firstElementChild.classList.add("fa-moon")),document.addEventListener("DOMContentLoaded",()=>{getcolorscheme(),switchBurger()})</script></div></header><main class="grow pt-16"><div class=pl-scrollbar><div class="mx-auto w-full max-w-screen-xl lg:px-4 xl:px-8"><div class=lg:pt-12><div class="flex flex-col md:flex-row bg-secondary-bg rounded"><div class="md:w-1/4 lg:w-1/5 border-e"><div class="sticky top-16 pt-6"><div id=sidebar-title class="md:hidden mx-4 px-2 pt-4 pb-2 md:border-b text-tertiary-text md:text-primary-text"><span class=font-semibold>Table of Contents</span>
<i class='fas fa-caret-right ms-1'></i></div><div id=sidebar-toc class="hidden md:block overflow-y-auto mx-6 md:mx-0 pe-6 pt-2 md:max-h-doc-sidebar bg-primary-bg md:bg-transparent"><div class="flex flex-wrap ms-4 -me-2 p-2 bg-secondary-bg md:bg-primary-bg rounded"><a class=hover:text-eureka href=https://b.hui.ke/docs/asiainfo-acse-training/>ACSE（亚信安全认证安全专家）</a></div><ul class=ps-6><li class=py-2><div><a class=hover:text-eureka href=https://b.hui.ke/docs/asiainfo-acse-training/9/>OSCE XG 第四讲 日志和管理</a></div></li><li class=py-2><div><a class=hover:text-eureka href=https://b.hui.ke/docs/asiainfo-acse-training/8/>OSCE XG 第三讲 病毒防护配置</a></div></li><li class=py-2><div><a class=hover:text-eureka href=https://b.hui.ke/docs/asiainfo-acse-training/7/>OSCE XG 第二讲 安装部署</a></div></li><li class=py-2><div><a class=hover:text-eureka href=https://b.hui.ke/docs/asiainfo-acse-training/6/>OSCE XG 第一讲 产品概述</a></div></li><li class=py-2><div><a class="text-eureka hover:text-eureka" href=https://b.hui.ke/docs/asiainfo-acse-training/5/>安全威胁课程——防护和治理</a></div></li><li class=py-2><div><a class=hover:text-eureka href=https://b.hui.ke/docs/asiainfo-acse-training/4/>安全威胁课程——网络攻击</a></div></li><li class=py-2><div><a class=hover:text-eureka href=https://b.hui.ke/docs/asiainfo-acse-training/3/>安全事件处理建议</a></div></li><li class=py-2><div><a class=hover:text-eureka href=https://b.hui.ke/docs/asiainfo-acse-training/2/>反病毒技术发展</a></div></li><li class=py-2><div><a class=hover:text-eureka href=https://b.hui.ke/docs/asiainfo-acse-training/1/>安全威胁课程-恶意软件部分</a></div></li></ul></div></div></div><div class="w-full md:w-3/4 lg:w-4/5 pb-8 pt-2 md:pt-8"><div class=flex><div class="w-full lg:w-3/4 px-6"><article class=prose><h1 class=mb-4>安全威胁课程——防护和治理</h1><div class="text-tertiary-text not-prose mt-2 flex flex-row flex-wrap items-center"><div class="me-6 my-2"><i class="fas fa-calendar me-1"></i>
<span>2020-02-21</span></div><div class="me-6 my-2"><i class="fa-solid fa-pen-to-square me-1"></i>
<span>2020-02-21</span></div><div class="me-6 my-2"><i class="fas fa-clock me-1"></i>
<span>3 min read</span></div><div class="me-6 my-2"><i class="fas fa-folder me-1"></i>
<a href=https://b.hui.ke/categories/it/ class=hover:text-eureka>IT</a></div><div class="me-6 my-2"><i class="fas fa-th-list me-1"></i>
<a href=https://b.hui.ke/series/asiainfo/ class=hover:text-eureka>AsiaInfo</a></div><div class="me-6 my-2"><i class="fa-solid fa-eye me-1"></i>
<span id=busuanzi_value_page_pv><i class="fa fa-spinner fa-spin"></i></span> Hits</div></div><p>  技术部分第四节内容，即第二章《病毒与威胁基础》之任务 5《安全威胁课程——防护和治理》</p><h2 id=安全模型和要求>安全模型和要求</h2><h3 id=cia-三元组>CIA 三元组</h3><ol><li>保密性：确保信息在存储、使用、传输过程中不会泄露给非授权用户或实体</li><li>完整性：确保信息在存储、使用、传输过程中不会被非授权篡改，防止授权用户或实体不恰当地修改信息，保持信息内部和外部的一致性</li><li>可用性：确保授权用户或实体对信息及资源的正常使用不会被异常拒绝，允许其可靠而及时地访问信息及资源</li></ol><h3 id=深度防御的安全控制分类>深度防御的安全控制分类</h3><h4 id=行政管理控制>行政管理控制</h4><h4 id=技术性控制我们所关心的部分>技术性控制（我们所关心的部分）</h4><ol><li>网络安全</li><li>主机安全</li><li>应用安全</li><li>数据安全和备份恢复</li></ol><h4 id=物理性控制>物理性控制</h4><h2 id=安全技术体系>安全技术体系</h2><h3 id=安全技术体系方案设计>安全技术体系方案设计</h3><h4 id=区域边界安全>区域边界安全</h4><ol><li>网络安全域划分与隔离：隔离网闸、防火墙</li><li>网络入侵检测与防护：IDS / IPS</li><li>网络边界准入：网络准入、应用准入、客户端准入</li><li>边界内容控制：防病毒网关</li></ol><h4 id=通信网络>通信网络</h4><ol><li>网络冗余：链路负载均衡、服务器负载均衡、双机热备</li><li>网络传输安全：VPN</li><li>网络设备安全检测：漏洞扫描</li></ol><h4 id=计算环境>计算环境</h4><ol><li>应用安全：身份认证和权限划分、应用服务器统一监控</li><li>主机安全：终端安全管理、移动终端、终端入侵检测和反病毒</li><li>数据安全：通信与存储加密、本（异）地数据备份与恢复</li></ol><h3 id=基于原则和策略的安全治理>基于原则和策略的安全治理</h3><h4 id=防火墙技术>防火墙技术</h4><ol><li>软件防火墙</li><li>硬件防火墙<ol><li>静态的数据包过滤防火墙：网络层</li><li>应用级网关防火墙：应用层</li><li>状态检测防火墙（动态包过滤防火墙）：会话层和网络层</li></ol></li></ol><h4 id=ids--ips>IDS / IPS</h4><p>  假如说防火墙是一幢大楼的门锁，那入侵监测系统就是这幢大楼里的监视系统</p><ol><li>IDS（Instrusion Detection Systems）入侵检测系统<ol><li>基于规则检测</li><li>基于行为检测（基于启发式检测）</li></ol></li><li>IPS（Intrusion Prevention System）入侵防御系统：有阻断和处理功能的IDS</li></ol><h4 id=nacnetwork-access-control网络准入控制>NAC（Network Access Control）网络准入控制</h4><ol><li>节点检测</li><li>身份认证</li><li>安全检测</li><li>授权</li><li>策略执行</li><li>隔离修复</li><li>接入控制</li></ol><h4 id=防病毒网关>防病毒网关</h4><ol><li>UTM（Unified Threat Management）统一威胁管理</li><li>NGFW（Next generation firewall）下一代防火墙</li></ol><h4 id=vpnvirtual-private-network虚拟专用网>VPN（Virtual Private Network）虚拟专用网</h4><h4 id=漏洞评估漏洞防护虚拟补丁防护>漏洞评估/漏洞防护（虚拟补丁防护）</h4><p>  可以在不影响应用程序和其相关库，以及为其提供运行环境的操作系统的情况下，为应用系统安全虚拟补丁</p><p>  如一个应用程序的早期版本已不再获得供应商支持，则此虚拟补丁是支持该早期版本的唯一方法</p><p>  可抵御零日漏洞</p><h4 id=数据加密技术>数据加密技术</h4><h4 id=身份鉴别技术>身份鉴别技术</h4><p>  4A 统一安全管理平台解决方案</p><ol><li>Account 集中账号管理</li><li>Authentication 集中认证管理</li><li>Authorization 集中权限管理</li><li>Audit 集中审计管理</li></ol><h3 id=安全审计>安全审计</h3><ol><li>流量审计、行为升级、数据审计</li><li>评估漏洞及隐患</li><li>测试策略和操作情况</li><li>发现网络系统入侵</li><li>调查取证</li></ol></article><div class=my-4><a href=https://b.hui.ke/tags/%E5%AE%89%E5%85%A8%E5%A8%81%E8%83%81/ class="inline-block bg-tertiary-bg text-sm rounded px-3 py-1 my-1 me-2 hover:text-eureka">#安全威胁</a>
<a href=https://b.hui.ke/tags/%E5%AE%89%E5%85%A8%E9%98%B2%E6%8A%A4/ class="inline-block bg-tertiary-bg text-sm rounded px-3 py-1 my-1 me-2 hover:text-eureka">#安全防护</a>
<a href=https://b.hui.ke/tags/%E5%AE%89%E5%85%A8%E6%B2%BB%E7%90%86/ class="inline-block bg-tertiary-bg text-sm rounded px-3 py-1 my-1 me-2 hover:text-eureka">#安全治理</a></div><div class=py-2><div class="my-8 flex flex-col items-center md:flex-row"><a href=https://b.hui.ke/authors/hui.ke/ class="md:me-4 text-primary-text h-24 w-24"><img src=https://b.hui.ke/bagua.webp class="bg-primary-bg w-full rounded-full" alt=Avatar></a><div class="mt-4 w-full md:mt-0 md:w-auto"><a href=https://b.hui.ke/authors/hui.ke/ class="mb-2 block border-b pb-1 text-lg font-bold"><h3>Hui.Ke</h3></a><span class="block pb-2">❤ Cyber Security | Safety is a priority.</span>
<a href=mailto:3199731997@qq.com class=me-2><i class="fas fa-envelope"></i></a>
<a href="https://wpa.qq.com/msgrd?v=3&uin=3199731997" class=me-2><i class="fab fa-qq"></i></a>
<a href=/images/aixinxianquan.webp class=me-2><i class="fab fa-weixin"></i></a></div></div></div><div class="-mx-2 mt-4 flex flex-col border-t px-2 pt-4 md:flex-row md:justify-between"><div><span class="text-primary-text block font-bold">Previous</span>
<a href=https://b.hui.ke/docs/asiainfo-acse-training/6/ class=block>OSCE XG 第一讲 产品概述</a></div><div class="mt-4 md:mt-0 md:text-right"><span class="text-primary-text block font-bold">Next</span>
<a href=https://b.hui.ke/docs/asiainfo-acse-training/4/ class=block>安全威胁课程——网络攻击</a></div></div><div id=valine-comments class=mt-4></div><script defer src=https://cdn.jsdelivr.net/npm/valine@1.4.16/dist/Valine.min.js integrity=sha384-e0+DNUCJo75aOAzHQbFWYBCM9/S4f0BhRJXvEgbE3mMS85RM20MSSGStHuNdY2QK crossorigin></script>
<script>document.addEventListener("DOMContentLoaded",function(){new Valine({el:"#valine-comments",appId:"BQnVqWIiq78AdqwyhvBVAa3y-MdYXbMMI",appKey:"RKg5By312YjM8rU6WkkfK9IN",recordIP:"true",serverURLs:"https://l.hui.ke",visitor:"true"})})</script></div><div class="hidden lg:block lg:w-1/4"><div class="bg-secondary-bg
prose sticky top-16 z-10 hidden px-6 py-4 lg:block"><h3>On This Page</h3></div><div class="sticky-toc
border-s
hidden px-6 pb-6 lg:block"><nav id=TableOfContents><ul><li><a href=#安全模型和要求>安全模型和要求</a><ul><li><a href=#cia-三元组>CIA 三元组</a></li><li><a href=#深度防御的安全控制分类>深度防御的安全控制分类</a><ul><li><a href=#行政管理控制>行政管理控制</a></li><li><a href=#技术性控制我们所关心的部分>技术性控制（我们所关心的部分）</a></li><li><a href=#物理性控制>物理性控制</a></li></ul></li></ul></li><li><a href=#安全技术体系>安全技术体系</a><ul><li><a href=#安全技术体系方案设计>安全技术体系方案设计</a><ul><li><a href=#区域边界安全>区域边界安全</a></li><li><a href=#通信网络>通信网络</a></li><li><a href=#计算环境>计算环境</a></li></ul></li><li><a href=#基于原则和策略的安全治理>基于原则和策略的安全治理</a><ul><li><a href=#防火墙技术>防火墙技术</a></li><li><a href=#ids--ips>IDS / IPS</a></li><li><a href=#nacnetwork-access-control网络准入控制>NAC（Network Access Control）网络准入控制</a></li><li><a href=#防病毒网关>防病毒网关</a></li><li><a href=#vpnvirtual-private-network虚拟专用网>VPN（Virtual Private Network）虚拟专用网</a></li><li><a href=#漏洞评估漏洞防护虚拟补丁防护>漏洞评估/漏洞防护（虚拟补丁防护）</a></li><li><a href=#数据加密技术>数据加密技术</a></li><li><a href=#身份鉴别技术>身份鉴别技术</a></li></ul></li><li><a href=#安全审计>安全审计</a></li></ul></li></ul></nav></div><script>window.addEventListener("DOMContentLoaded",()=>{enableStickyToc()})</script></div></div></div></div></div><script>document.addEventListener("DOMContentLoaded",()=>{hljs.highlightAll(),changeSidebarHeight(),switchDocToc()})</script></div></div></main><footer class=pl-scrollbar><div class="mx-auto w-full max-w-screen-xl"><div class="text-center p-6 pin-b"><script async src=/js/click.js></script><div id=poem_ip></div><script type=text/javascript>jinrishici.load(function(e){tags.innerHTML=e.data.matchTags})</script><div><span id=timeDate>载入年天数...</span><span id=times>载入时分秒...</span>
<script async src=/js/duration.js></script></div><a href=https://www.foreverblog.cn/go.html target=_blank><img src=https://img.foreverblog.cn/wormhole_4_tp.gif alt style=display:inline-block;width:auto;height:32px title=穿梭虫洞-随机访问十年之约友链博客></a><p class="text-sm text-tertiary-text"><script async src=//busuanzi.ibruce.info/busuanzi/2.3/busuanzi.pure.mini.js></script>本站总访问量 <span id=busuanzi_value_site_pv></span> 次
&#183; 您是本站的第 <span id=busuanzi_value_site_uv></span> 个小伙伴</p><script async src=/js/tab.js></script></div></div></footer></body></html>