In traditional e-governance network construction, it is easy to ignore network security in the design, and there exist many potential risks. The security risk analysis is as follows:
The core backbone network lacks intrusion prevention capabilities, and user access and core backbone links in the cloud platform lack intrusion prevention measures, leading to potential risks.
1. Lack audit means for system access. Network security administrators don’t know the system operation and access status, cannot promptly find existing security risks in the system, and don’t know who has accessed various business systems in the entire production network.
2. Lack of site-specific monitoring and management mechanisms. It is nearly impossible to control the security status of sites in real time, leading to potential security risks. The development of web applications has led to online systems exerting an increasingly important role, however, at the same time, more and more online systems are frequently attacked due to security risks. Sensitive online data and webpages are tampered and may even become the puppet to spread Trojans, eventually causing more damage to visitors and result in serious losses.
3. Internal security virtualization cluster. Data exchange between virtual machines within the same physical machine does not pass through the traditional network access layer switch, which directly leads to the failure of many traditional security methods, inability to isolate the control between virtual machines, and other problems like inability to monitor and audit traffic data between virtual machines. Furthermore, current traditional host-based security protection cannot adapt to the virtual machine environment. At the same time, the virtualized network structure makes it difficult to achieve traditional sub-domain protection, and virtualized service delivery also makes it difficult to identify, control and audit user ID, permissions and behavior.
4. Lack regulatory measures for cloud platforms. Cloud platforms host substantial business systems, so it is vital for administrators to conduct audits and maintain control of permissions on the cloud platform.
5. Hidden dangers exist in mobile applications, and it has become a trend to obtain relevant information, handle business, and make payments through mobile APPs. However, due to frequent vulnerabilities in smartphone operating systems, especially in the Android platform, such as arbitrary rooting and privilege management issues, the operating environment of mobile applications is not secure. Connection to mobile terminals and requests for data access place an additional burden on network security.