| The article points out the importance and necessity of the information-security from its actuality in our country.The resources in the information system ,for instance,hardware,software,data,document,operator,meterial and so on ,are evaluated and gived safety grade firstly.And then,it analyses the menace including the nonauthorized access, the information leak,the refused sevice,the internal objection which the system will take.The following are the corresponding control police:Confirm the users' rights and duties,including the mode of using account,the limit of accessing resource,the application of password,the building of backup;Confirm the administrators' right and duties,including physical safety,system configuration,account configuration and usufruct,password management,audit and control,backup and individual intimity;Run-of-mill measure of security defence,including access control,symbol and identification,integrality control,password technique,firewall system,audit and resumption,safety of operating system,safety of database system,defence of computers' virus and resisting-deny protocol.In the end,the article offers the strategies of disposing the safety-accident and analyse after itHow.to report it,how to solve it in phase,and how to avoid it happening again.In a word,the article presents a holistic resolvent about keeping away the information system's security,and supplies a essential frame for its configuration,management and application.The article elaborates on medical treatment insurance integrated services network MIS at last,especially details the issues in actualizing it:the strategy of network security,the technique of popedom management,the technique of multilayer-distributing bases on groupware,encrpytion checkout,the mode of popedom management bases on roles,audit and control of operation-log,and theory of closed loop safety control. |