Network Security Self-Inspection Report Model 1
According to the superior document "on the focus of the county network cleanup and inspection of the work of the notice", the town actively organize the implementation of the network security infrastructure construction, network security prevention technology and network information security and confidentiality management of the situation of the self-investigation, on the My town's network information security construction carried out a profound analysis, now the self-inspection report is as follows:
First, the establishment of a leading group
To further strengthen the town's network cleanup work, the town set up a network cleanup work leading group, the mayor of the town as the leader, the deputy mayor in charge of vice mayor of the town as the deputy head of the office set up under the office, so that the division of labor is clear, the responsibility of the specific to the person, to ensure that the network cleanup work The smooth implementation of the network cleanup work.
Second, my town network security status quo
My town government information technology construction from the beginning to now, after continuous development, gradually from the original network without too high security standards upgraded to the current office system with a certain degree of security. At present, the town's computers are using antivirus software to protect the network and virus prevention.
Third, the town network security management
In order to do a good job of information technology construction, standardize the management of government information technology, the town specifically formulated a "confidential non-confidential computer confidentiality management system", "confidential non-confidential mobile storage media confidentiality management system" and a number of other systems, information technology management, internal computer security management, computer and network equipment management, data, data and information security management, network security management, information management and security management. The information technology work management, internal computer security management, computer and network equipment management, data, data and information security management, network security management, computer operator management, website content management and other aspects have made detailed provisions to further standardize the town's information security management.
The town regularly organize all the information on the website to ensure that the use of computers to do "who uses, who is responsible for", has not been found to be involved in the security of confidential content of the information; the town generated data and information on strict, standardized management, and timely archiving backup; In addition, the town within the scope of the town to organize relevant In addition, the town in the town-wide organization of the relevant computer security technology training, and carry out targeted "network information security" education and exercises, and actively participate in other computer security technology training, improve network maintenance and security protection skills and awareness, and strongly guarantee the normal operation of the town government information network.
Fourth, the network security deficiencies and corrective measures
At present, the town network security there are still the following deficiencies: First, the security awareness is relatively weak; Second, the virus monitoring capacity needs to be improved; Third, in the event of a malicious attack, computer virus attacks and other emergencies to deal with insufficient capacity.
At present, the town of network security deficiencies, the following corrective actions:
1, to further strengthen the town's network security team members of the computer operating technology, network security technology training, to strengthen the town's computer operators on the network of viruses, information security threats to the preventive awareness, to do early detection, early reporting, early processing.
2, strengthen the town's cadres and workers in computer technology, network technology learning, and constantly improve the level of cadres computer technology.
3, strengthen the maintenance of equipment, timely replacement and maintenance of faulty equipment to avoid the emergence of major security risks, for the stable operation of the town network to provide hardware protection.
V. Opinions and suggestions on the network cleanup and inspection work
As the level of information technology continues to improve, people rely on network information is also growing, to protect the network and information security, safeguard national security and social stability, has become an urgent need to solve the problem of the development of information technology, due to the lack of professional talents in the town's network information, information security technology is still not enough to understand, the higher authorities can strengthen the relevant knowledge, to ensure the safety of the network and information security. I hope the higher authorities can strengthen the relevant knowledge of the training and rehearsal, in order to improve our ability to prevent.
Network Security Self-Inspection Report Model 2
According to Hengshui City, Hengshui City Network and Information Security Coordination Group issued the "Hengshui City 20xx Network and Information Security Inspection Program" requirements, combined with the actual, seriously on the city's information systems security inspection, now the inspection report is as follows:
A network and Overall evaluation of the information security situation
This year, the city, the Bureau attaches great importance to information security work, information security work on the important agenda, in order to standardize the work of information disclosure, the implementation of the relevant provisions of information security, the establishment of a leading group for information security work, the implementation of the management body, a special information technology office responsible for the day-to-day management of information security, a clear information security supervisor The information security of the leadership, the leaders in charge and specific management personnel.
Successively established and improved the daily information management, information security protection management and other related work systems, strengthened the information security education work, information security work leading group regularly or irregularly on the city's information security work to check the problems found in a timely manner to rectify, and further standardize the work of information security to ensure that the information security work is carried out effectively, the city's information security work. The city's information security work has made new progress.
Second, the main work of network and information security
(a) strengthen leadership, clear responsibilities, and grasp the network and information security organization and management. In order to standardize and strengthen the work of information security, the city leaders attach great importance to the work as a key task, set up by the mayor in charge as the leader, in charge of the information work of the Bureau of leadership as deputy leader, the relevant municipal units as members of the leading group of information security work. To do a clear division of labor, responsibility, the formation of a competent leader is responsible for the overall responsibility, the specific manager is responsible for the main responsibility, hierarchical management, one level to grasp one level, layer by layer to implement the leadership system and working mechanism, and effectively put the information security work into practice.
(B) do a good job of network and information security day-to-day management. According to the actual work, I established and improved the information system security status self-check system, information system security responsibility system, computer and network security management and other related systems, so that information security work to further standardize and institutionalize.
(C) the implementation of good network and information security protection management. Sound and perfect the non-confidential computer confidentiality management system, non-confidential mobile storage media confidentiality and other management systems. Firewall installed on the computer, while configuring and installing a professional antivirus software, strengthened in the anti-tampering, anti-virus, anti-attack, anti-paralysis, anti-disclosure and other aspects of effectiveness. Network terminals have not violated the phenomenon of access to the Internet and other information networks, the unit has not installed wireless networks and other wireless devices, and the installation of professional antivirus software for mobile storage devices.
(D) the development of information security emergency management mechanism. Combined with the actual, the city's initial establishment of emergency response plan, the establishment of electronic correspondence and information reporting processing system (for trial implementation) and electronic correspondence and information reporting job responsibility system, strict receipt and distribution of documents to improve the inventory, repair, numbering, signing system; information managers in a timely manner to update the system and software, important documents, information resources to do timely backup, data recovery.
(E) security education and training is being gradually carried out. The second half of this year, the city plans to carry out a network and information security and other aspects of the operation of all computer users training, and explain some of the knowledge of network security.
(F) seriously carry out information security checks. City information security work leading group will be regular or irregular on the city network and information security work to check, to find out the problems of timely rectification, to ensure the effective exhibition of information security work.
Third, the network and information security self-examination of the main problems found and rectification
According to "Hengshui City 20xx network and information security inspection program" in the specific requirements, in the work of the self-examination process, we have also found a number of deficiencies and to be rectified.
1. problems. In the process of self-examination of the following situations: First, the lack of input. Due to the lack of professional and technical personnel in the city, and the city's financial information systems security can be invested in a limited amount of funds, so in the process of network and information security construction of limited investment in the force; second is the initial establishment of the system of regulations, but is not yet perfect, failing to cover all aspects of security of the relevant information systems; third, in the event of a computer virus attack and other emergencies, the treatment is not timely enough.
2. Rectification. In view of the above problems, we will do a good job of four "continue". First, continue to improve and implement the information security system, should often irregularly check the implementation of the information security system, for the adverse consequences of the responsible person, to be seriously held accountable, so as to improve the information personnel security protection awareness; second is to continue to pay attention to the implementation of the system, to further improve the network and information security system at the same time, the arrangement of specialists to closely monitor, at any time and place to solve possible security incidents of information systems. Information system security incidents; Third, continue to strengthen the city's leading cadres, network information personnel security awareness education, improve the initiative and conscientiousness to do a good job of information security; Fourth, continue to strengthen and increase the city's information lines, information systems, and other aspects of timely maintenance, maintenance, updating efforts.
Fourth, the network and information security work of the views and recommendations
It is recommended that the province, the city to increase the county and municipal areas of information security work of the guidance, regular information security education and training, and constantly improve the modernization of the information security work to facilitate the staff to further strengthen the prevention of network and information security and confidentiality work; it is recommended that the province, the city to increase the work of the information security with the The provincial and municipal increase and information security work of the financial and technical investment efforts to ensure the smooth progress of work, to ensure information security.
Network Security Self-Inspection Report Sample 3
I have always attached great importance to the work of the network information security system, set up a special leadership group, the establishment of a sound network security and confidentiality of the responsibility system and the relevant rules and regulations, by the Bureau of Information Technology Center unified management, the various sections are responsible for the work of their respective network information security. Strictly implement the provisions of the network information security and confidentiality, to take a variety of measures to prevent the occurrence of security and confidentiality-related incidents, on the whole, the Bureau's network information security and confidentiality work to do a more solid, the effect is also better, in recent years did not find the loss of confidentiality issues.
A computer classified information management
This year, the Bureau to strengthen organizational leadership, strengthen publicity and education, the implementation of the responsibility to strengthen the daily supervision and inspection, the management of classified computers in hand. For the management of computer magnetic media (floppy disk, U disk, mobile hard disk, etc.), to take a person to keep, classified documents stored separately, is strictly prohibited to carry the existence of classified content of the magnetic media to the Internet's computer processing, storage, transmission and processing of documents, the formation of a good security and confidentiality of the environment. Classified computers (including laptops) implemented with the Internet and other public **** information network physical isolation, and in accordance with the relevant provisions of the implementation of confidentiality measures, so far, there has not been a computer loss of confidentiality, leakage of accidents; other non-classified computers (including laptops) and the use of the network, but also in strict accordance with the Bureau's computer confidentiality information system management approach to the implementation of the relevant measures to ensure that the agency's information security. Information security.
Second, computer and network security
First, network security. I equipped with anti-virus software, network isolation card, the use of strong password password, database storage backup, mobile storage device management, data encryption and other security measures, clear network security responsibilities, strengthened network security work.
The second is the implementation of leadership review and signature system for information system security. Where the uploading of information on the website, must be reviewed and signed by the relevant leaders before uploading; secondly, to carry out regular security checks, mainly on the SQL injection attacks, cross-site scripting attacks, weak passwords, operating system patch installation, application patch installation, anti-virus software installation and upgrading, Trojan horse virus detection, port openings, openings of the system management privileges, openings of the access privileges, web page tampering and so on. The company has been monitoring the system security diary.
Third, the daily management of the effective grasp of the extranet, website and application software "five-layer management", to ensure that "classified computers do not access the Internet, access to the computer is not classified", in strict accordance with the confidentiality requirements to deal with the management, maintenance and destruction of CD-ROMs, hard drives, USB flash drives, mobile hard disks and other Management, maintenance and destruction. Focus on the "three major security" investigation: First, hardware security, including lightning, fire, theft and power connections; second, network security, including network structure, security log management, password management, IP management, Internet behavior management; third, application security, including websites, mail systems, resource library management, software management.
Third, the use of hardware equipment is reasonable, the software settings are standardized, and the equipment is in good operating condition.
I installed anti-virus software for each terminal, the application of system-related equipment has been taken to standardize the management of the use of hardware equipment in line with the relevant national product quality and safety regulations, the operating environment of the unit hardware meets the requirements of the printer accessories, ribbon holders, etc., the basic use of the original equipment products; lightning ground is normal, for the problematic lightning sockets have been replaced, lightning protection equipment run The operation of lightning protection equipment is basically stable, and there are no lightning accidents; UPS operates normally. The website system is safe and effective, and there is no security risk for the time being.
Fourth, the normal operation of communication equipment
I Bureau of network systems and their configuration of the composition of a reasonable structure, and in line with the relevant security provisions; network using a variety of hardware equipment, software and network interfaces are also through the safety inspection, identification and qualification before being put into use since the installation of the operation of the basic normal.
Fifth, strict management, standardized equipment maintenance
I Bureau of computer and its equipment to implement the "who uses, who manages, who is responsible for" management system. In terms of management, we adhere to the "system of control". The second is to strengthen information security education, improve staff computer skills. At the same time in the bureau to carry out network security knowledge propaganda, so that all staff realize that computer security protection is "three prevention and one protection" is an integral part of the work. And in the new situation, computer crime will become an important part of security work. In the maintenance of equipment, specially set up a network equipment failure register, computer maintenance and repair table for equipment failure and maintenance of the situation is registered, and timely processing. Foreign maintenance personnel, required to be accompanied by relevant personnel, and its identity and handling of the situation to register, standardize the maintenance and management of equipment.
Six, website security and
I Bureau of website security requirements, one is the use of exclusive access to password lock login background; two is to upload files in advance of the pathogen detection; three is the site sub-module sub-privilege maintenance, regular into the background to clean up the garbage files; four is the website update is responsible for the person.
VII, the development and implementation of security systems
In order to ensure the safety of the computer network, the implementation of the network administrator system, computer security and confidentiality system, website security management system, network information security emergencies contingency plans in order to effectively improve the administrator's work efficiency. At the same time, I combined with their own situation to develop a computer system security self-check work system, to do four ensure: First, the system administrator on Fridays to regularly check the center's computer system to ensure that there is no hidden problems; Second, the production of safety inspection records to ensure the implementation of the work; Third, the implementation of the leadership of the system of regular inquiries by the system administrator to report on the use of computers to ensure that the situation at any time to grasp; Fourth, the organization of the whole bureau on a regular basis to learn about network knowledge, improve computer security contingency plans and other effective work of the administrator. Personnel to learn about the network knowledge to improve the level of computer use to ensure prevention.
Eight, security education
In order to ensure the safe and effective operation of the Bureau's network, reduce the virus invasion, the Bureau of network security and system security related knowledge of training. During the period, people encountered in the actual work of the computer-related issues in the detailed consultation, and received satisfactory answers.
IX. Self-examination of existing problems and corrective comments
We found some management weaknesses in the management process, the future we have to improve in the following areas.
(a) for the line is not neat, exposed, immediately on the line for a limited period of rectification, and do a good job of rodent-proof, fire safety.
(ii) Strengthen equipment maintenance, timely replacement and maintenance of faulty equipment.
(c) Self-inspection found that individual personnel computer security awareness is not strong. In the future, we will continue to strengthen computer security awareness education and preventive skills training, so that employees fully realize the seriousness of computer cases. The combination of human defense and technical defense, really do a good job of the unit's network security.
Network Security Self-Inspection Report Sample 4
According to Hengshui City, Hengshui City Network and Information Security Coordination Group issued the "Hengshui City 20xx Network and Information Security Inspection Program" requirements, combined with the actual, seriously on the city's information systems security inspection, now the inspection report is as follows:
First, network and Overall evaluation of the information security situation
This year, the city, the Bureau attaches great importance to information security work, information security work on the important agenda, in order to standardize the work of information disclosure, the implementation of the relevant provisions of information security, the establishment of a leading group for information security work, the implementation of the management body, a special information technology office responsible for the day-to-day management of information security, a clear information security supervisor The information security of the leadership, the leaders in charge and specific management personnel.
Successively established and improved the daily information management, information security protection management and other related work systems, strengthened the information security education work, information security work leading group regularly or irregularly on the city's information security work to check the problems found in a timely manner to rectify, and further standardize the work of information security to ensure that the information security work is carried out effectively, the city's information security work. The city's information security work has made new progress.
Second, the main work of the network and information security in 20xx
(a) Strengthen the leadership, clear responsibilities, and grasp the network and information security organization and management. In order to standardize and strengthen the work of information security, the city leaders attach great importance to the work as a key task, set up by the mayor in charge as the leader, in charge of the information work of the Bureau of leadership as deputy leader, the relevant municipal units as members of the leading group of information security work. To do a clear division of labor, responsibility, the formation of a competent leader is responsible for the overall responsibility, the specific manager is responsible for the main responsibility, hierarchical management, one level to grasp one level, layer by layer to implement the leadership system and working mechanism, and effectively put the work of information security into practice.
(ii) do a good job of network and information security day-to-day management. According to the actual work, I established and improved the information system security status self-check system, information system security responsibility system, computer and network security management and other related systems, so that information security work to further standardize and institutionalize.
(C) the implementation of good network and information security protection management. Sound and perfect the non-confidential computer confidentiality management system, non-confidential mobile storage media confidentiality and other management systems. Firewalls are installed on computers, while professional antivirus software is configured and installed to strengthen the effectiveness of anti-tampering, anti-virus, anti-attack, anti-paralysis, anti-disclosure and other aspects. Network terminals have not violated the phenomenon of the Internet and other information networks, the unit has not installed wireless networks and other wireless devices, and the installation of professional antivirus software for mobile storage devices.
(D) the development of information security emergency management mechanism. Combined with the actual, the city's initial establishment of emergency response plan, the establishment of electronic correspondence and information reporting processing system (trial) and electronic correspondence and information reporting job responsibility system, strict document receipt and distribution, improve the inventory, repair, numbering, signing system; information managers in a timely manner to update the system and software, important documents, information resources to do timely backup, data recovery.
(E) security education and training is being gradually carried out. The second half of this year, the city plans to carry out a network and information security and other aspects of the operation of all computer users training, and explain some of the knowledge of network security.
(F) seriously carry out information security checks. Municipal information security work leading group will be regular or irregular on the city network and information security work to check, to find out the problem of timely rectification, to ensure the effective exhibition of information security work.
Third, the network and information security self-examination of the main problems found and rectification
According to "Hengshui City 20xx network and information security inspection program" in the specific requirements, in the process of self-examination of the work, we also found a number of deficiencies and to be rectified.
1. Problems. In the process of self-examination of the following situations: First, insufficient input. Due to the lack of professional and technical personnel in the city, and the city's financial information systems security can be invested in limited funds, so the network and information security in the process of investing in a limited force; Second, the initial establishment of rules and regulations, but is not perfect, failing to cover all aspects of security of the relevant information systems; Third, in the event of a computer virus attack and other emergencies, the treatment is not timely.
2. Rectification. For the above problems, we will do a good job of four "continue". First, continue to improve and implement the information security system, should often irregularly check the implementation of the information security system, leading to adverse consequences of the responsible person, to be seriously held accountable, so as to improve the information personnel security protection awareness; Second, continue to pay attention to the implementation of the system, to further improve the network and information security system at the same time, arrange for specialists to closely monitor, and at any time, anywhere to solve the possible security incidents of information systems; Third, continue to grasp the system implementation. Information system security incidents; Third, continue to strengthen the city's leading cadres, network information personnel security awareness education, improve the initiative and conscientiousness to do a good job of information security; Fourth, continue to strengthen and increase the city's information lines, information systems, and other aspects of timely maintenance, maintenance, updating efforts.
Fourth, the network and information security work of the views and recommendations
Recommended that the province, the city to increase the county and municipal information security work guidance, regular information security education and training, and constantly improve the modernization of information security work to facilitate the staff to further strengthen the prevention of network and information security and confidentiality; recommended that the province, the city to increase the work with the information security The provincial and municipal increase in information security work with the financial and technical investment efforts to ensure the smooth progress of work, to ensure information security.
Network Security Self-Inspection Report Sample 5
According to the road bureau "on the whole bureau within the scope of the network and information security check the action of the notice" (XXXXXXXXXX) the spirit of the document.
First, the organization of information security self-check work
1, set up an information security check action group. By the station manager, secretary of the head, the relevant section (workshop) responsible for the information technology section of all the staff responsible for the station's important information systems to comprehensively check and fill in the relevant statements, archives to be kept.
2, the information security inspection team against the actual situation of the network and information systems to carry out item-by-item inspection, confirmation, and self-check the results of a comprehensive check, sorting, analysis. Rectification, improved control of the entire station network and information security situation.
Second, the network and information security work
1) The organization set up a network and information security inspection working group, headed by the station manager, secretary as a team leader, the relevant section (workshop) responsible for the head of the information technology section of all the staff for the team members.
2) Study and formulate the self-check implementation plan, according to the independence of the business undertaken by the system, the independence of the responsible body, the independence of the network boundaries, the independence of the security protection equipment and facilities of the four factors, the ticket issuance and booking system, passenger service system, office information system to carry out a comprehensive comb and comprehensive analysis.
2, August 6 before the ticket sales and booking system, passenger service systems, office information systems, the basic situation of the item-by-item investigation.
1) Self-inspection of the basic situation of system security
Passenger ticket sales and booking system is a real-time system, which has a high impact on the main business of the station. At present, it has 2 IBM servers, 2 cisco routers, 13 cisco switches, and the system adopts windows operating system, the disaster recovery situation is system-level disaster recovery, the system is not connected to the Internet, and the firewall adopts the Wingtat security control firewall of Wingtat Company.
The passenger service system is a real-time system, which has a high impact on the main business of the station. At present, it has 13 HP servers, 5 H3C routes and 15 H3C switches. The system adopts linix operating system, the database adopts SQLServer, and the disaster preparedness situation is data disaster preparedness; the system is not connected to the Internet, and the security protection strategy adopts the opening of ports in accordance with the needs of use, and the encrypted protection is adopted for important data.
2) Self-inspection of security management
Personnel management, the designation of a full-time information security officer, the establishment of an information security management organization and a full-time information security organization. All personnel in important positions have signed security and confidentiality agreements, and have formulated the Security Provisions for Separation and Departure of Personnel and the Approval Form for Visits by External Personnel.
In terms of asset management, specialized personnel were appointed to carry out asset management, improve the Asset Management System, Equipment Repair and Maintenance and Waste Management System, and establish the Equipment Repair and Maintenance Record Sheet.
Storage media management, improve the "storage media management system", the establishment of the "storage media management record sheet".
Operation and maintenance management, the establishment of the "Customer Service System Maintenance Standards", "Operation and Maintenance Operation Record Sheet", and improve the "Daily Operation and Maintenance System".
3) Network and information security training
Third, the main problems found in the self-inspection and the analysis of the threats faced
Fourth, improvement measures
Fifth, the effect of the rectification
Network Security Self-Inspection Report Sample 6
In order to further strengthen the security of the information system of the hospital management, strengthen the awareness of information security and confidentiality, improve the level of information security, in accordance with the provincial health planning commission "on the xx provincial health system network and information security supervision and inspection of the work of the notice" document requirements, the leadership of the hospital attaches great importance to the establishment of a special management organization, held a meeting of the relevant departments responsible for in-depth study and seriously implement the spirit of the document, fully aware of the network and information security self-checking work The importance and necessity of self-checking work made a detailed deployment, the dean in charge is responsible for arranging, coordinating the relevant inspection departments, supervision and inspection projects, the establishment of a sound hospital network security and confidentiality responsibility system and relevant rules and regulations, the strict implementation of the provisions of the confidentiality of the network information security and security, and for the hospital departments of the network information security situation for the special inspection, the self-checking situation is now reported as follows: p p>
First, the basic situation of hospital network construction
Our hospital information management system in xx xx month by xxxx technology limited company on the hospital information management system (HIS system) to upgrade. The upgraded front-end maintenance is the responsibility of our hospital's technical staff, and the back-end maintenance and outside incident handling is the responsibility of the technical staff of XXXX Technology Co.
Second, self-examination of the work
1, machine room safety inspection. Server room safety mainly includes: fire safety, electricity safety, hardware safety, software maintenance safety, door and window safety and lightning safety and other aspects of security. Hospital information system server room is strictly in accordance with the standard construction of the server room, the staff adhere to the daily scheduled inspections. System servers, multi-port switches, routers have UPS power protection, which can ensure that in the event of a power outage of three hours, the equipment can run normally, not due to a sudden power outage caused by equipment damage.
2, local network security checks. It mainly includes network structure, password management, IP management, storage media management, etc. The operators of the HIS system each have their own login name and password and are assigned the corresponding operator privileges, and are not allowed to use other people's operating accounts, and the accounts are subject to the management system of "whoever uses it, whoever manages it, and whoever is responsible for it". The hospital's local area network (LAN) has a fixed IP address, which is uniformly assigned and managed by the hospital, so it is not possible to add a new IP privately, and unassigned IPs cannot be connected to the hospital's LAN. All computer USB ports in the hospital LAN are completely closed, effectively avoiding the occurrence of poisoning or leakage caused by external media (such as USB flash drives and mobile hard drives).
3. Database security management. Our hospital has taken the following measures for data security:
(1) Separate the part of the database that needs to be protected from other parts.
(2) Use authorization rules, such as accounts, passwords and access control and other access control methods.
(3) Database accounts and passwords are managed and maintained by specialized personnel.
(4) Database users must change their passwords every 6 months.
(5) The server adopts virtualization for security management, when the current server problems, switch to another server in a timely manner to ensure the normal operation of the client's business.
Third, emergency disposal
Our hospital HIS system server operation is safe, stable, and equipped with a large UPS power supply, which can ensure that in the case of large-scale power outages, the server can run for about six hours. Our HIS system has just been upgraded and put on line not long ago, and the server has not had a long downtime, but the hospital has still formulated an emergency handling plan and trained the fee operators and nurses, so that if there is a large-scale and prolonged power outage in the hospital, and the HIS system can not function normally, the manual charging, bookkeeping, and issuing of medicines will be started temporarily to ensure that the diagnostic and treatment activities can be carried out in a normal and orderly way, and then make up the time when the HIS system resumes normal work. When the HIS system resumes normal operation, the invoices and charges will be made up.
Fourth, there are problems
The hospital's network and information security work done more seriously, carefully, has never been a major security incidents, the system is stable, the business can run normally. However, the self-examination also found shortcomings, such as the current hospital information technology staff is small, information security forces are limited, information security training is not comprehensive, information security awareness is still enough, the lack of initiative and conscientiousness of the individual departments to maintain information security; emergency drills to carry out insufficient; poor conditions of the computer room; individual departments of the computer equipment allocation of the low, the service period of a long time.
In the future, it is necessary to strengthen the training of information technology personnel, improve the level of information security technology, strengthen the information security education of the entire hospital staff, improve the initiative and conscientiousness of maintaining information security, increase the investment in the hospital's information technology construction, enhance the allocation of computer equipment, and further improve the work efficiency and security of system operation.