HUBEI AGRICULTURAL SCIENCES ›› 2020, Vol. 59 ›› Issue (24): 9-15.doi: 10.14088/j.cnki.issn0439-8114.2020.24.002

• Reviews • Previous Articles     Next Articles

Research on the application of key information infrastructure security strategy

XING Li-ping1, CHEN Kan2, WANG Fan1   

  1. 1. Hubei Meteorological Information and Technical Support Center,Wuhan 430074,China;
    2. Hubei Tax Bureau, Wuhan 430071,China
  • Received:2020-08-20 Online:2020-12-25 Published:2021-01-21

Abstract: On the basis of combing the security problems of key information infrastructure in Hubei province, combining the grade evaluation report to reflect the main problems and suggestions for rectification, and according to the research ideas of constructing security architecture, the technical strategies including strengthening online security product protection strategy, adding redundant network key nodes and seamless access of security products to the current network are adopted to carry out phased rectification step by step. The results show that the application of various techniques solves the problem of missing redundant design of WAN nodes in the key information infrastructure of Hubei province, and alleviates the irregular situation that the login address of core network equipment and server is not uniform, the password complexity and the periodic replacement are difficult to implement. Through the grade evaluation and risk assessment of the evaluation organization, the safety protection grade requirements and standards of the key information infrastructure in Hubei province are gradually related, and the safety protection ability is improved year by year.

Key words: security level protection assessment, critical information infrastructure, IRF, HRSP, VPC

CLC Number: