Saturday, September 25, 2010

Henan Ruyang County treasury centralized payment center - the first county in Henan province treasur




January 7, 2003, Henan Province, the first county treasury centralized payment center inaugurated in Ruyang County Finance Bureau was established. It marked the county treasury in Henan Province was officially launched reform of the expenditure management system.
Ruyang County finance department with the times, make bold explorations in recent years has promoted the reform of rural taxes and fees, government procurement, payroll system hair, department budget and other financial management system. To further enhance the level of financial management to meet the requirements of the development of public finances, the Council leadership decided, in the counties as well as full implementation of the administrative institutions in order to "centralized treasury payment Wei Zhu, with centralized accounting" of public finance management of the new mode of expenditure. The mode of public finance management software Gsoft Newgrand as a platform, a framework covering budget, line financial, agricultural finance, social security, infrastructure, government procurement, budget and other key business information network system.

The specific way the county is:

(A), reform the financial system of internal management, the establishment of single treasury account system
Treasury management system reform first initiated from the internal reform of the financial bureau, set up a "Ruyang County Treasury Centralized Payment Center" (hereinafter referred to as payment center), as the executing agency for the state treasury centralized payment will be dispersed in the shares of the original room management account together, the establishment of single treasury account system of unified management. Treasury single account system, including six accounts:
The first treasury deposit account
Second, extra-budgetary funds
Third, the policy of capital accounts
Fourth, direct payment of financial accounts (zero balance of the financial account)
Fifth, the financial authority to pay accounts
6 is a special account
Payment center starts, all fiscal funds, regardless of budget, budget, or the various special funds, all payments through the central treasury to pay to achieve a combination of both budgetary funds, tied to use, significantly enhanced the ability of macroeconomic regulation and control.

(B), standardized way of capital expenditure and disbursement procedures
1 payment. Paid according to different subjects, different types of expenditures, respectively, for fiscal and financial authority to pay direct payments.
2, payment procedures. Financial direct payment procedures require approval of the departmental budget units according to the monthly budget plan with a section, the Financial Bureau reported that approval of the corresponding business unit room. Actual expenditure of funds for payment of the first unit to use paragraph application for approval of the department to pay the Centre budget and financial plan and related requirements to use the payment application on preconditions, issued a warrant for payment to the agent bank, agent bank into liquidation by financial funds from the treasury single account system to the payee's bank account transfer. Financial reserve fund authorized payment program administered mainly by the agent bank imprest deposit card making unified, specified by the budget unit specifically responsible for Consuming, storage, use.

(C), the reform unit of accounting methods, the implementation of centralized accounting
Counties as well as administrative, public institutions included in the scope of centralized payment, the financial management of the implementation of "five no change", namely: the nature of capital remains unchanged, capital ownership change, capital spending the same channel, the right to change the leadership of Finance approval, accounting, the main responsibility for change. Accounting adhere to the "four principles": one unit of account to withdraw from the account pays Tong Yi, centralized payment, household accounts; Second, the unit expenditure pays the audit certificate Tongguo be reimbursed after; third unit to have in mind account, the financial sector account recorded auxiliary; 4 is a unit of accounting, treasury positions can be grouped reservations, reservations can also be combined post.

Since the operation of payment center, achieved significant practical results:

(A) the payment of the main, secondary accounts, financial oversight in the pay into.
Ruyang County's reforms do not change the existing system of financial management and accounting, treasury positions, based on fiscal and budget units within the department store had the funds distributed to the state treasury single account system management, to achieve "unification accounts, sub- accounting, centralized allocation "of standardized operation. Eliminate duplication and fragmentation of bank accounts to avoid a lot of money halfway precipitation, idle, misappropriate or even the phenomenon of corruption and other illegal and discipline.
(B) streamline procedures, improve efficiency, user-friendly models
The establishment of information systems within the financial sector, the fund management to achieve the department budget, the wage system made, government procurement, comprehensive infrastructure, medical and social security and other financial operations in a software system running, funding application, report, approval of the basic realization of paperless online transfer, operations flow through the network, the staff can not run around upstairs, downstairs, through all procedures. Leaders at all levels through dial-up Internet access, etc., always check the financial capital of the workings, usage; supervision and auditing departments can check their financial capital of the flow monitor use, to achieve on-line audit. After the reform, simplify approval procedures of financial funds, cash flow significantly improved the efficiency of the budget unit of money is more convenient.







Recommended links:



demand for project management of change CONTROL



Articles About Desktop



IGRP Update mechanism description description



Luoyang Office "Social SECURITY" No need to run errands



IDC: 100 yuan notebook and PC is no big student



New Vertical Market Apps



E-Mail CLIENTS Specialist



Review Search Or Lookup Tools



RMVB TO MP4



Rongcheng School Link



MicroStrategy to support Apple? IPhone?



MKV TO MP4



National Social Security card can break the ice in the Yangtze River Delta region



Wealth Life - Interview with Dr. Xin Rong RECORD



3G2 to MOV



Tuesday, September 21, 2010

IDS, we can look at it another look


Today in the frequent intrusion, the best way to prevent the integrated use of firewall, IDS and IPS.

Traditional stateful firewall as the first line of defense to prevent attacks on the network layer, but can not prevent worms and other application-layer attacks (these attacks take advantage of the open ports 80 and 443, etc.). Intrusion detection systems use sensors, passive sensors installed in the network, used to monitor network traffic, looking for any signs of malicious access. Sensors to detect attacks targeting the application layer, but can not prevent these attacks, when the network receives an IDS alarm information and take appropriate measures, often too late.

IDS trouble

IDS will bring a large number of false alarms. Some users believe that, IDS alarm information often been made, the results are mostly false positives, and alarm information is not logical to deal with IDS alarm message is a headache problem, users often take 20 hours to investigate the analysis of two hour alarm information. Some network administrators have complained that, "Every day I spend a lot of time to look at IDS records, eating lunch, side view, even holidays, no exception, those IDS records every day I just became a must-see Little Red Book . "

The defective IDS, Gartner recommends that users use the IPS (intrusion prevention system) instead of the traditional IDS. ISS, NetScreen, NAI, TippingPoint, StillSecure, and Top Layer IPS equipment companies can provide. And simple monitoring and alarm of the difference is that IDS, IPS can only stay on the line to prevent attacks. Entercept (now a part of NAI's) and Okena (now a part of Cisco's) companies such as host-based IPS software can be directly deployed on application server, intercepting system calls to monitor changes to critical system files, file permissions allow signs of change, and other attacks.

IDS really as Gartner put it died a natural death yet? IPS IDS can always replace it? Most analysts and IDS vendors, and even IPS vendors do not think so. At least so far, we believe that IDS in security audit and later follow-ups still can not be replaced. In fact, IDS and IPS use the same detection technology, will be testing both the accuracy of the trouble. IPS judge for fear of error may affect the normal network services, most users will IPS to IDS (used only for monitoring) mode access to the corporate network.

IPS IDS together

IDS and IPS vendors in the automation of configuration and intelligence analysis, more attempts are being made. For example, TippingPoint's UnityOne can be configured in minutes. Including Cisco, Symantec and ISS, including the IDS system vendors can also provide audit function to remove irrelevant warning information.

Compared with IDS products, IPS equipment is expensive. IPS to protect the external, DMZ area and one or two key aspects of subnet useful, but in a large 400-subnet network, the user may not have the economic strength of the deployment of IPS for all the subnets.

In fact, IPS and IDS can be used in conjunction with their respective merits. IPS to prevent worms in the application layer attacks for the same time, reduce the number of alarms generated within the IDS, allowing users to monitor the safe use of the IDS subnet and improve enterprise security strategy. For example, a user using the Top Layer's Attack Mitigator IPS to protect the gateway and data centers, by opening the process to make sure that each filter will not block any legitimate business processes. Attack Mitigator IPS is deployed outside the firewall to block DoS attacks, while the users within the network to monitor the use of IDS is no need to spend too much time to view the IDS records. Similarly, another user on the network perimeter using the TippingPoint UnityOne IPS devices and the network within the extensive use of behavior-based detection of StealthWatch IDS Snort IDS to replace the original equipment. Blocking effect of the IPS, IDS alerts to reduce the number by 99%, before the user needs to record all the time to view the IDS, but now they do not do so.

Summary

In addition to IPS, the other designed to protect the DMZ Web server and application technology is the Web application firewall, such products is to prevent unauthorized use of Web applications, especially firewall and IPS to prevent being left out of the Web application theft attacks. In addition, host-based intrusion prevention software can also key to the server internal Web applications and provides additional protection. Check Point and NetScreen firewall products, increase in the detection of deep, deep testing and rely on hardware features of the IPS, and Web application firewall is different, Check Point and NetScreen firewall is software-based applications to achieve.

Faced with the current security challenges, most analysts and vendors agree that: layers of defenses, the firewall, IPS and IDS respective advantages, is currently the best means of protecting corporate networks.
Hope this article will allow readers to re-recognize IDS, with the use of the common between them to prevent network intrusions.






Recommended links:



CSS Generated Special Effects



P2P affected 90% of operator revenue flow erosion



Produced with the VB toolbox floating upper normal place of residence



Using VMware, vowed to computer "cloned A technique"



Youtube h264



Articles About Reference Tools



Thief 3 Of Original Experiences



Premier Screen Savers



3G the first number up to the "special" USER



Operator within 30 seconds to bring a surprise



Expert Vehicles - Screen Savers



PICKED Audio Speech



A large number of international giants fight back to the Chinese. CN domain names



iphone video format



psp windows media PLAYER



Ps3 Mts



Note: Some People In The Ping You?