The information network shall be able to resist network attacks from outside the firewall, and use popular attack means to simulate attacks. If it cannot be broken, it will be judged as qualified;
2. Internet access control
The information network shall control the Internet connection request and content of the internal terminal according to the demand, and use the terminal to access different resources of the Internet with different identities. It is qualified if it meets the design requirements;
Intelligent engineering
Spread the files (virus samples) containing the current known popular viruses to each point through file transmission, email attachments, Internet neighbors, etc. the anti-virus software at each point shall be able to correctly detect the virus containing files and perform anti-virus operations; Those who meet the requirements are judged as qualified;
If an intrusion detection system is installed, use popular attack means to simulate attacks (such as DOS denial of service attack), and these attacks should be found and blocked by the intrusion detection system; Those who meet this requirement are judged as qualified;
Wechat QR code