| Key points of management | control measures | Identification | Review the business environment and key resources and services, including formulating information security specifications and risk management strategies | Protection | Formulate and implement corresponding defensive measures to strengthen key resources and services. Including identity and access management, anti-virus software, system repair management | Detection | Establish a mechanism for real-time detection of information security time and warning, including e-mail prevention system and intrusion detection system | undo | Designate a data backup plan, which can return to normal operation in the shortest time in case of an information security incident |
|
| TOP |