Current location - Training Enrollment Network - Education and training - What are the common security technical precautions in Internet cafes?
What are the common security technical precautions in Internet cafes?
(a) security officer

Internet cafes should set up full-time or part-time security officers, who should be certified by the public security organs after passing the training and examination.

(2) Safety technical measures

In accordance with the relevant provisions of the Regulations on the Administration of Internet Service Sites, implement safety technical measures to ensure the operation safety and information safety of the local area network of this Internet cafe. Ensure the correct installation and normal operation of safety technical measures. Specific projects are:

1, the actual situation of Internet cafes (Internet cafe name, legal representative, network structure, network address, number of machines) is consistent with the filing materials;

2. Whether the mirror function setting is correct and whether the mirror function plays an application role;

3. Whether the log has been saved and backed up for more than 60 days, and whether the log information is complete and true;

4. Whether the "Filter King" system and PUBWIN system are installed correctly and run normally;

5. Whether the seat number, machine number and intranet IP correspond to each other;

6, Internet cafes LAN whether there is harmful information, bad information, etc.

(3) Safety management system

Advocate the wind of "civilized internet access and civilized management" in the internet bar industry, provide a clean and tidy internet environment and positive internet information for the society, and promote the healthy development of internet information in our city. Establish and improve various safety management systems of computer information systems, implement the safety management responsibility system, and improve the practical role of the safety management system. Require the safety management system to be on the wall.

————————————————————————

1. General security protection

The so-called "routine security protection" means the same three security methods as Windows 98: installing anti-virus software, upgrading the system and prohibiting Ping. It should be emphasized that Windows XP, like its predecessor Windows 2000, has endless loopholes, and the system upgrade should not be as sloppy as Windows 98. In addition to installing Microsoft's vulnerability patch for "Shockwave", it is recommended to upgrade Windows XP to the latest Service Pack 1 (the resource occupation will be improved after the upgrade, but the security and stability will be improved).

2. Remote assistance is prohibited and the idle port is blocked.

On Windows XP, there is a function called "Remote Assistance", which allows users to send remote assistance invitations to their friends on MSN to help them solve their problems when they have difficulty using their computers.

And this "remote assistance" function is the manifestation of RPC (Remote Procedure Call) service that Shockwave virus wants to attack on Windows XP. Users are advised not to use this function, and should also install the RPC vulnerability tool and the "shock wave" immunization program provided by Microsoft before using it. The way to prohibit "remote assistance" is to open the system properties dialog box (right-click "My Computer" and "Properties") and remove the "√" before "Allow sending remote assistance invitations from this computer" in the "Remote" item.

You can use the "TCP/IP filtering service" that comes with your system to restrict ports. The method is as follows: right-click the network connection, select Properties, open the network connection properties dialog box, select Internet Protocol (TCP/IP) in the general item, then click the [Properties] button below, and click [Advanced] below in the Internet Protocol (TCP/IP) properties window. Select an option in the pop-up advanced TCP/IP settings window, and then click the [Properties] button below. Finally, the TCP/IP filter window pops up. Through the "Allow Only" radio box in the window, add ports allowed by network protocols such as TCP, UDP and IP respectively (as shown in Figure 3), but do not provide various ports. This is the best form of security.