Cybersecurity
Cybersecurity Guidelines
Corporate Management / Information Security Promotion
- Establish a dedicated organization,assign managers and personnel,and regularly revies and promote information security polocies.
- Operating procedures:covering core business,system inventory,risk assessment,system development and maintenance,security protection outsourcing.
Staff training / Staff training
- Security promotion:All employees reveive information security training every year,and dedicated personnel receive professional courses.
- Social Engineering Drills:Examples Conduct annual email drills to educate and train those who mistakenly open emails.
Technical Support / Technical Resources
- Network segmentation: Separate development,testing and formal operating environments,and establish protective measures.
- protective measures: Use anti-virus software,intrusion detection,AI WAF website application firewall,etc.
- Data protection: Establish data encryption,access permissions, transmission encryption and other measures.
- System security detection:regularly perform vulnerability scanning,penetration testing, and source code security detection.
- Monitoring measures: Establish monitoring measures for authentication failures,access failures,etc., and protect log records.
Cybersecurity



Overview of Cybersecurity Protection Software
Category | Information Security Protection and Control | Measures Effective Effect |
---|---|---|
Information Security Management Guidelines |
★ Antivirus software ★ Network firewall ★ Application firewall ★ Intrusion detection |
Protection against viruses,malware and unauthorized network access, Email filtering |
System security test |
★ Perform regular vulnerability scans ★ Penetration testing ★ Source code security detection |
to prevent potential attacks
|
Data ptotection | ★ Data encryption ★ Access rihgts ★ Transmission encryption |
Protect confidential Information from disclosure or unauthorized access
|