目录目录..................................................................................................................2第一章总则.........................................................................................................41.1范畴.......................................................................................................41.2目标.......................................................................................................41.3原则.......................................................................................................41.4制定与实施.............................................................................................5第二章安全组织结构............................................................................................62.1安全组织结构建立原则..............................................................................62.2安全组织设置..........................................................................................62.3安全组织职责..........................................................................................62.4人员安全管理..........................................................................................9第三章基本安全管理制度....................................................................................103.1入网安全管理制度..................................................................................103.2操作安全管理制度..................................................................................103.3机房与设施安全管理制度.........................................................................103.4设备安全使用管理制度............................................................................113.5应用系统安全管理..................................................................................113.6媒体/技术文档安全管理制度....................................................................11第四章用户权限管理..........................................................................................134.1用户权限...............................................................................................134.2用户登录管理........................................................................................134.3用户口令管理........................................................................................14第五章运行安全................................................................................................155.1网络攻击防范........................................................................................155.2病毒防范...............................................................................................165.3访问控制...............................................................................................165.4行为审计...............................................................................................175.5异常流量监控.........................................................................................1715.6操作安全...............................................................................................185.7IP地址管理制度.....................................................................................185.8防火墙管理制度.....................................................................................19第六章安全事...