Chapter 297: Hundred Schools

readx;

After Zhang Kun finished speaking, Cui Dongye, the director of the structure group sitting at the conference table, looked at Zhang Kun with great satisfaction, and someone in the structure group also spoke. Pen @ fun @ pavilion wWw. biqUgE怂 info [a lot of good novels].

What Zhang Kun said caused a small discussion in the conference room, which was conclusive and very reasonable.

Bi Hongzhan looked at Zhang Kun and said with a smile: "Zhang Kun is right, the entire security network system, topological architecture is the top priority, the structure group can have this proposal is very good, and the system group that is closely connected with the structure group has nothing to say?" ā€

Listening to Bi Hongzhan's words, the director of the system group, Zhen Fan was a little embarrassed on his face, after all, no one in his group had put forward a rationalization proposal.

Just when Zhen Fan frowned, Li Yun, who was sitting next to Bi Hongzhan, politely raised his hand and signaled.

"Can I make some suggestions?" Li Yun said with a little humility.

Bi Hongzhan looked at Li Yun, and then said: "Xiaoyun, you are a top student of applied science at the Ice University of Technology, how can you not mention it!" ā€

After listening to Bi Hongzhan's words, Li Yun stood up, slowly walked to the middle of the conference room, walked behind Zhen Fan and stopped, at this time Li Yun had already integrated the security information system he knew in his mind and had his own ideas.

"The structure of the whole network is important, but the system is complementary to it. The architecture belongs to the external hardware, and the system is the software, which is the mind of the frame of the frame, and human beings can reproduce, in addition to relying on physical strength, the most important thing is to rely on intelligence and thought. Now Pangu has the most operable operating system in the whole Qin country, and even in the world, although each operating system will leave a backdoor, but the system that maintains the internal security network information of Pangu Group must have no backdoor. Besides, we still have an arrest team on standby, and they don't dare to act rashly. (800) novel/" Li Yun said, looking at everything with a scholarly attitude, wanting to see what others were saying.

After Li Yun finished speaking, everyone in the conference room looked at Li Yun in amazement, it was hard to imagine that Li Yun, as a junior majoring in applied science, could have such a deep understanding of the infrastructure of network security information, and Bi Hongzhan, who was sitting next to Li Yun, looked at Li Yun with admiration.

At this time, Zhen Fan turned around slightly to look at Li Yun, and Li Yun had already left behind him, thinking about walking between the conference table and the auditor table.

At this time, Gong Yu, a technician from the system group, stood up, looked at Li Yun, and then said: "Mr. Li, you said that the network security information system is indeed a link that we need to pay attention to. Pangu's operating system is a three-network security maintenance test of the R&D Technology Department, all of which have reached the standard, but when encountering hackers who do not play cards according to common sense, this backdoor will be completely exposed, and it seems that this backdoor really can't be kept. ā€

Li Yun heard Gong Yu of the system group say this, agreed with his own opinion, and was very comforted in his heart, and then further said: "It is recommended to seal the back door, and after the system is improved, the management configuration module will plan the access of the configuration unit through the trusted path system as needed, complete the reliable system configuration, and realize the coordination and scheduling between the modules." As long as the discovery team and the capture team can act in a timely and effective manner, the hackers will definitely be discovered. At the same time, the protocol conversion module is established to screen and check the network access, filter the access commands and parameters that are not allowed in the access, and after the data analysis is carried out by the analysis group, it is guided by the tracking group to convert the post-protocol into a special transmission protocol that can be recognized by the data switch switch control unit, so as to transmit it to the maintenance group to achieve the overall protection. ā€

Li Yun finished speaking again, which shocked everyone in the conference room.

The technical personnel of each group only made suggestions for their own specialty, but Li Yun made suggestions for the entire network security architecture, which is a detail that ordinary technical personnel cannot think of.

The supervisors of each group looked at Mr. Li, who was two rounds younger than him, and they all sighed to themselves.

Bi Hongzhan looked at Li Yun's brilliance, and an irrepressible excitement appeared on his face, which once again confirmed Li Yun's ability.

"Xiaoyun said very thoroughly, each group has elaborated on the suggestions that our security information system needs to be upgraded, and the tracking team has any suggestions." Bi Hongzhan did not deliberately praise Li Yun, because Li Yun's performance has impressed all the technicians and the supervisors of each group.

After listening to Bi Hongzhan's words, the people in the tracking group seemed to be discussing, and the director of the tracking group, Fang Wensheng, looked at the young men under him a little, and saw that no one had raised any opinions, and suddenly felt a little embarrassed.

Just when Fang Wensheng was feeling tormented, a crisp voice appeared, this person was Lin Xinxin.

Lin Xinxin got up, didn't care about the gazes of other male colleagues, and said in a muffled voice: "One thing I want to add is hacking. Instead of letting hackers be unscrupulous, it is better for us to return the favor to others, and hackers also take advantage of loopholes to carry out intrusions, and we can do the same. ā€

After listening to Lin Xinxin's words, Fang Wensheng admired this airborne talent a little.

"The hacker can hack, which means that he has full confidence and avoids his defeat, so how can you carry out anti-intrusion, the tracking team has never done this." Fang Wensheng also said with some conservative thoughts.

After listening to Fang Wensheng's words, Cao Cheng, the director of the arrest team, said teasingly: "Old Fang, do you dare to say that you have never done that?" How did you deal with it, have you forgotten? Ha ha. ā€

Hearing Cao Cheng say this, the directors of the other groups smiled without hostility, and when the second room Wensheng heard this, he suddenly remembered that when the 'One Sword from the West' attacked, it was Lin Xinxin, a little girl, who carried out a counter-invasion to force the One Sword West to retreat, so that the capture team and the tracking team worked together to remove it.

"Yes! Oh, yes! Look at my memory. Fang Wensheng said in a bit of a trance.

At this time, Bi Hongzhan said: "Okay, little girl, you should tell us your specific thoughts!" This is an opportunity, maybe you will become a benchmark? ā€

Lin Xinxin looked at Bi Hongzhan, and then looked at Li Yun, who had been paying attention to herself, and looked at Li Yun's affirmative eyes, although Lin Xinxin was a few years older than Li Yun, she always felt like a child.

Lin Xinxin said: "Hacker intruders often use some technologies and tools that are used by normal people and are well-known in the security field to invade, so they will not know it, and usually use scanners." A scanner is a program that automatically detects security weaknesses in remote or local hosts, by scanning TCP ports and recording feedback, it is possible to discover the assignment of various TCP ports, the services provided, and their software versions in the remote server without leaving a trace. This provides an intuitive or indirect insight into the security issues of the remote host. However, because scanners cannot directly attack network vulnerabilities, hackers use scanners to find various security vulnerabilities on the target host and then use other hacking methods to carry out malicious attacks. A hacker carries out an intrusion, then he will use this way, and vice versa, we can also, traditionally hackers only think that the intrusion will only be remedied, but in the information supervisory department there are a lot of resources for two-front operations, that is, defense and counterattack. ā€

??

Provide full-text online reading, faster update and better article quality, if you think the network is good, share this site more! Thank you readers for your support!

The latest chapter of the high-speed debut martial arts master in the city, this chapter is the address if you think this chapter is not bad, please don't forget to recommend it to your friends in the QQ group and Weibo!