Cybersecurity
Cybersecurity Guidelines
Corporate Management / Information Security Promotion
- Establish a dedicated organization,assign managers and personnel,and regularly revies and promote information security polocies.
- Operating procedures:covering core business,system inventory,risk assessment,system development and maintenance,security protection outsourcing.
Staff training / Staff training
- Security promotion:All employees reveive information security training every year,and dedicated personnel receive professional courses.
- Social Engineering Drills:Examples Conduct annual email drills to educate and train those who mistakenly open emails.
Technical Support / Technical Resources
- Network segmentation: Separate development,testing and formal operating environments,and establish protective measures.
- protective measures: Use anti-virus software,intrusion detection,AI WAF website application firewall,etc.
- Data protection: Establish data encryption,access permissions, transmission encryption and other measures.
- System security detection:regularly perform vulnerability scanning,penetration testing, and source code security detection.
- Monitoring measures: Establish monitoring measures for authentication failures,access failures,etc., and protect log records.
Cybersecurity
 
					 					 
					 					 
					    
					
				Overview of Cybersecurity Protection Software
| Category | Information Security Protection and Control | Measures Effective Effect | 
|---|---|---|
| Information Security Management Guidelines | ★ Antivirus software ★ Network firewall ★ Application firewall ★ Intrusion detection | Protection against viruses,malware and unauthorized network access, Email filtering | 
| System security test | ★ Perform regular vulnerability scans ★ Penetration testing ★ Source code security detection | 
to prevent potential  attacks | 
| Data ptotection | ★ Data encryption ★ Access rihgts ★ Transmission encryption | 
Protect confidential  Information from disclosure or unauthorized access | 
