• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    Information Security: Document Permissions Are The Key To Security Control.

    2014/4/20 15:09:00 16

    Information SecurityDocument PermissionsSecurity Control

    "P" this year's "two sessions" an important term has been mentioned, that is, information security. < /p >
    < p > in the era of rapid development of information technology and < a href= "http://www.91se91.com/news/index_c.asp" > Internet < /a >, information security is becoming a topic of increasing concern. With the deepening of information technology and network, information security has become more and more popular and has gradually become a livelihood topic of a country. < /p >
    < p > while we are constantly discussing information security, many people do not assume that if information security is an individual or even a "person", how can it communicate with us, what will it tell us? < /p >
    < p > "because of the continuous development of information and network technology, modern enterprises are advancing on the road of informatization. However, no matter how far or forward, the main body that needs protection inside the enterprise is still those data and information itself. As a document that carries the information and data carrier, it has become the key to protection. Further inference is made. If we want to control the information security of enterprises, we must start with the safety control of documents." < /p >
    < p > "access control is the most important means for document control. With the continuous development of protection technology and access control technology, we can have more detailed management of document permissions. < /p >
    < p > Information Security: "meticulous management of documents can be divided into: read-only, write, download, offline, delete, rename, print, etc." < /p >
    < p > read only: files can only be read by specific users, and can not be edited, saved or modified. For those who do not have read only permission, they are garbled. < /p >
    < p > < a href= "http://www.91se91.com/news/index_c.asp > > Edit < /a >: files can be modified in various ways. After the file is modified, the author of the document will become the modifier himself. < /p >
    < p > Copy: files can be opened in specific places, and copy can not be used elsewhere. < /p >
    < p > printing: the file has no print permissions, and the user print indicates no specific permissions. Users need to print, and must undergo an approval process. < /p >
    < p > screenshot: users can manipulate files, but they can't divulge files through QQ. < /p >
    < p > Download: files can only be used on specific servers, and copy is not available locally. < /p >
    < p > offline: files can only be used within the organization and bring out the organizational environment (even in legitimate offline notebooks). < /p >
    < p > time: the file has the limitation of opening time. < /p >
    < p > times: there are restrictions on the number of files to be opened. < /p >
    < p > and now the fine protective effect can be achieved by the document permissions of Shan Li waterproofing wall < a href= "http://www.91se91.com/news/index_c.asp" > management module < /a >. At the same time, the module can achieve the following protective effect. < /p >
    < p > [publish permission] set the permissions of the author's encrypted documents to other users. In the medium-sized enterprises, there are different departments and heads of departments. In the document authority management module of Shan Li network, the permissions and readmissions of departmental staff are set up to restrict employees' access to the documents of department heads. They can only read, do not edit, save or modify, so as to protect the safety of enterprise documents. < /p >
    < p > [superior authority] set the author as the authority of the higher level to encrypt documents to other users. The implementation effect of this permission is just the opposite of the issuing authority. The person in charge of a different project team or a senior project team leader would like to view the files of other project groups or lower level project groups, but because of the requirement of ensuring confidentiality of documents, medium-sized enterprises can set up superior authority. < /p >
    < p > author permission to set author's permission to encrypt documents. The purpose of the authority is to dispose of the employees who intentionally or unintentionally destroy the documents created or processed during the service. < /p >
    • Related reading

    Private Cloud Disk To Solve Enterprise Document Sharing Problems

    Document management
    |
    2014/4/20 15:04:00
    34

    桌面虛擬化趨勢之下如何保護桌面文檔

    Document management
    |
    2014/4/20 14:55:00
    24

    Documents In Agile: How Much And When To Write?

    Document management
    |
    2014/4/20 14:47:00
    19

    OA System: From Document Management To Knowledge Management

    Document management
    |
    2014/4/20 14:42:00
    25

    初志科技:涉密機構電子文檔的安全隱患

    Document management
    |
    2014/4/15 22:55:00
    58
    Read the next article

    Ida Ayashi: Fashion Design For Interest Only

    Although she has always insisted on her dress design as her hobby and an amateur life, but when she talked about fashion design, the reporter always felt the desire to pursue her fashion dream in her eyes. Perhaps, to enter the field of color poetry is to face the sun, do not ask for spring, only to face the mood of happiness, so that their own way of fashion and wide and wide.

    主站蜘蛛池模板: 校霸把学霸往死里做| 久久综合九色综合精品| www.日本在线| 精品久久久久香蕉网| 日韩免费视频一区| 国产精品永久久久久久久久久| 午夜视频在线观看国产| 久草网视频在线| 黑人巨大白妞出浆| 欧美国产第一页| 在线天堂资源www在线中文| 亚洲美女又黄又爽在线观看| 七次郎在线视频永久地址| 野花国产精品入口| 极上セレブ妇人北条麻妃bt| 国产欧美日韩亚洲一区二区三区| 亚洲激情第二页| 2016天天干| 欧美高清在线精品一区| 国产精品资源一区二区| 亚洲精品欧美精品日韩精品| xl上司带翻译无马赛樱花| 玉蒲团之天下第一| 女人张开腿无遮无挡图| 免费精品国产日韩热久久| gta5圣堂酒店第三辆车在哪里| 精品国产一区二区三区2021 | 蜜桃视频在线观看官网| 最近中文字幕mv在线视频www| 国产福利一区二区三区| 亚洲国产成人片在线观看| 国模私拍福利一区二区| 欧洲卡一卡二卡在线| 国产精品亚洲专区一区| 亚洲区视频在线观看| 91久久打屁股调教网站| 手机国产乱子伦精品视频| 免费人妻av无码专区| gta5圣堂酒店第三辆车在哪里| 欧美极品在线观看| 国产成人av在线影院|