期刊文献+

大数据背景下企业网络信息安全技术体系研究 被引量:39

Technical Architecture of Enterprise Network Information Security under Big Data Background
下载PDF
导出
摘要 研究大数据背景下企业网络信息安全保障技术体系建设的相关理论基础,讨论传统网络信息安全体系结构的层次划分和相关安全技术机制,探索当前大数据采集、存储、挖掘、发布等阶段的安全技术及云计算相关关键技术,分析大数据和云计算的关系,构建了兼顾传统网络安全技术以及大数据云安全技术的安全技术体系架构,并给出了综合技术体系框架,以期丰富企业解决网络信息安全问题的思路,充实企业提高大数据环境下信息安全技术水平的途径。 The related theoretical basis for technical architecture construction of enterprise network infosec assurance under big-data background is studied, the infozec hierarchy and related security technology mechanism of the traditional network discussed, the security technology for stages of present big-data acquisition, storage, mining and release explored, the relevant key technologies of cloud computing described, and the relationship of between big data and cloud computing analyzed. The security technical system architecture giving consideration to both traditional network security technology and big-data cloud security technology is constructed, and the integrated technical system framework also given in the paper, expecting to enrich ideas of the enterprise in solving the network infosec problem and to improve their infosec technical level under big-data background.
出处 《通信技术》 2017年第2期334-339,共6页 Communications Technology
基金 山东省软科学研究计划项目(No.2014RKB01576)~~
关键词 大数据 网络信息安全 云计算 技术体系 big data network information security cloud computing technical architecture
  • 相关文献

参考文献4

二级参考文献33

  • 1任明艳.互联网背景下国家信息主权问题研究[J].河北法学,2007,25(6):71-74. 被引量:26
  • 2DANAH B, KATE C. Six Provocations for Big Data [ EB/OLI. [ 2011-09-21 ]. http : //softwarestudies. com/cuhural_ analyt- ics/Six_Provocations_for Big Data- pdf.
  • 3SIMMONS J L. Buying you : the government's use of fourth-par- ties to launder data about the people [ J]. Columbia Business Law Review, 2009 (3): 956.
  • 4FROOMKIN A M. The Internet as a source of regulatory arbi- trage [ MI //KAHIN B, NESSON C. Borde~ in cyberspace: information policy and the global information structure. Massa- chusetts, MITPress, 1997: 129.
  • 5DUPONT B. The cyber security environment to 2022 : trends, drivers and implications [ EB/OL]. [2013-01-29 ]. http: // papers, ssm. com/sol3/papers, cfm? abstract_id = 2208548.
  • 6IRA R. Big data: the end of privacy or a new beginning? [J]. International Data Privacy Law, 2013, 3 (2) : 74.
  • 7KUNER C, CATE F H, MILLARD C, et al. The challenge of "Big data" for data Protection [ J]. International Data Privacy Law, 2012, 2 (2): 47-49.
  • 8TENE O, POLONETSKY J. Big data for all: privacy and user control in the age of anatytics [ J]. Northwestern Journal of Technology and Intellectual Property, 2013 (5) : 261.
  • 9INSTITUTE M G. Big data: the next frontier for innovation, competition, and productivity [ EB/OL]. [ 2011-06-04 ]. ht- tp : //www. mckinsey, com/insights/business_ technology/big_ data the next frontier for innovation.
  • 10TELANG R, WATFAL S. Impact of software vulnerability an- nouncements on the market value of software vendors-an empiri- cal investigation [ J]. IEEE Transactions on Software Engineer- ing, 2007, 33: 8.

共引文献48

同被引文献127

引证文献39

二级引证文献121

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部