DOC

Power marketing business applications of the security risks_3978

By Dana Pierce,2014-11-15 09:17
11 views 0
Power marketing business applications of the security risks_3978

Power marketing business applications of the security risks

     Abstract: The power of Marketing as a core business of the State Grid Corporation, State Grid Corporation is to improve the key to economic benefits, with basic and important role of guiding. But any application regardless of how well the safety control function, how secure operating environment , there is a security risk. However, the security of each system, and because the size of the risk of system control functions and operating environment varies. Keywords: system,

    security, prevention strategies Power Marketing as a core business of the State Grid Corporation, State Grid Corporation is to improve the key to economic benefits, with basic and important role of guiding. Power Marketing business Marketing

    business application system embodies its own integrity and management decisions, but also constituted power "SG186" in the organic part of the eight applications. any application regardless of how well the safety control function, how secure

    operating environment, there is a security risk. However, the security of each system, the size of the risk and because the system control functions and operating environment differs, therefore, how to improve the safety of the system, reduce security risks into the system designer and system users must be concerned about and consider. First, the power Marketing business in the form of application system security risk Power Marketing business application system's security is a system to maintain normal steady state of capability. Power Marketing business application system's security risk is due to human or non-human factors that make the power

    Marketing business application system to protect the safety of diminished capacity, resulting in hardware and software can

    not function properly the likelihood of such results. protect the security of the system is to protect the system from being damaged or destroyed after the system can more easily recycled, the power Marketing business application system

    security risks mainly in several areas: ?? Marketing data distortion. Marketing data, true, complete and accurate is the normal conduct of business Marketing, the basic requirements, once the power Marketing business application system security have been violated, the most direct impact is Marketing data errors, data loss or tampering with the Marketing data distortion. ?? marketing data leakage. Today, the rapid development of information Technology, marketing and data

management in the enterprise is becoming more important. ??

    system can not function properly. Second, the impact of power marketing business application system security risk factors Power marketing business applications of security risk factors can be from hardware systems, software systems,

    to consider three aspects of marketing data. (A hardware system of safety factors: incorrect operation, intentional destruction of human, unpredictable disaster. (B software systems of insecurity: the intentional destruction of the operator, computer viruses, hackers. (C marketing data of insecurity: the operator tampering with programs and data files, right and right to the user's illegal operation, marketing data and other stolen or tampered with. Third, the power marketing business application system security risk prevention strategies (A function in the software to exert the necessary control measures to protect the safety of marketing data ?? increase the necessary protection in a power outage, run interference in the user's sudden

    contingency. ?? data input system, the code would have to be tested, the data do not meet the requirements of the system not through. ?? increase necessary limit function. (B establish the necessary management system 1. Classification

    authority to implement user rights management, establish a network marketing business under the application system of personal responsibility. In accordance with business needs to set the operating position, clear job responsibilities and authority, and through the system functionality for each user authorized the implementation of its responsibilities and privileges. 2. Establish a strict system of internal check on the system all the jobs to be clear terms of reference, to achieve both the separation of incompatible

    duties, there should be some between the various positions within the containment protection. 3. To establish the necessary hands-on control and record control system

    operation. Reposted elsewhere in the Research Papers Download

    http:// ?? hardware to establish a strict operational procedures. ?? access to the system operator to develop standard operating procedures, clearly defined system of each operator to enter the order after the execution, the hardware requirements, data files and program files using the

    processing system contingency requirements and operational requirements, such as equipment, a power outage of processing and equipment requirements to re-start, while the disposal of

    developing standards for data files, the data file name,

retention time, storage sites, documents and other matters re-

    make provision for unified management. ?? by setting the software features, functions provided by the system or manual control records and other measures to the user's operating

    system to record all the activities, and regularly monitored by the system and inspection charge to keep abreast of illegal users and users have the right to override the case of using the system . 4. Establish a strict management system and

    damage the hardware remedial measures, such as the main server suddenly goes wrong, replaced by a spare server to work. Establish and improve equipment management system to ensure that the operating environment, hardware devices, power supply, temperature, humidity, static electricity, dust , electromagnetic interference, radiation, and so on. Next, the system operator should clarify the responsibilities and duties of their management and use within their own hardware, not unauthorized use, prohibit use of non-computer operator

    computer system to avoid undue damage to the operation of hardware devices. multiple users use the same equipment, to conduct strict registration and record the operation. 5. Establish a strict file management system, first of all, the

    system put into use, the original system, all the program files, software and hardware Technology information should be kept as a file, and should be the person responsible for strictly limited right users at the same time, the right to Users of non-normal time on the program is not normal contact calls in the file must also be kept by the systems and procedures for joint approval of the competent, and the user, the program name, out of time, the use of reason and purpose and the return time to conduct a detailed registration in

    order to say after the verification. 6. To establish security measures to prevent the virus. 7. To establish protective measures against hackers. ?? firewall, intrusion detection software to use. Intrusion detection

    software can detect hacker intrusion, and its exclusion from outside the internal network. ?? do a good job within the network host management. User name and password management system safety management is always the most important element

    of, any attack on the network, it is impossible without a valid username and password. But most of the system administrator only focus on the management of privileged users, while ignoring the ordinary user management. mainly in the easy way to set user convenience, random set user

    permissions, group and file permissions for unauthorized users

    to steal information and damage the system left a gap . ?? Set a good network environment. Online access to frequently used tools network operations command, their use

    must be limited, a variety of plug-ins on the system,

    components, services and other resources by some analysis. Security risk is the power marketing business applications an important factor in the normal operation of whether, in addition to the above measures, business leaders must improve the security risks of information systems knowledge and improve the professional quality of the system to use and ideological training to enable them to consciously abide by all rules and regulations and operating procedures to reduce errors in practical work to improve the system security awareness and consciousness of safety protection system, develop a comprehensive network structure of knowledge management, not only proficient in network technologies, but

    also can stand more observed a high angle problems, thinking problems, the security system to detect potential risks and promptly removed, which reduce the security risk is essential. References: [1] Guoyuan Fang, Zhang Zhixiang. Market economy

    and implementation of power marketing system of [J]. Changchun University of Technology (Social Science .2004.12 [2] Wang Yunming. On the overall implementation of power marketing and management strategies [J]. Guangxi University (Natural Science .2006.6 [3] Xie Ruijie. Analysis of the overall implementation of power marketing and management strategies [J]. Guangdong Science and Technology .2008.7 [4] Hui Liu. Strengthen the implementation of power marketing management approach [J]. Xinjiang Electric Power .2006.1 Links http://

    Research Papers Download

Report this document

For any questions or suggestions please email
cust-service@docsford.com