期刊文献+

大数据环境下高校网络空间安全治理策略研究 被引量:6

Research on the Security Government Strategy of University Network Space under Big Data Environment
下载PDF
导出
摘要 立足高校校园网络管理实践,研究大数据环境下校园网络空间安全治理问题,分析网络空间安全现状及主要形成原因,网络空间安全影响因素和关键环节,构建网络空间安全防护体系框架。从意识形态、管理制度及技术方面,搭建多元化高校网络空间安全管理平台等切实可行的网络空间治理策略和实施方法。 Based on the practice of university campus network management,in this paper,the security government issue of university campus network space under the big data environment was studied,the current situation and main causes of university network space security were analyzed,the influencing factors and key links of network space security were researched,and the framework of network space security protection system was built.The diversified network space security management platform of university was set up from the aspects of ideology,management system and technology.A series of feasible network space government strategies and methods were put forward.
作者 黄丽芬 HUANG Li-fen(Guangdong Vocational Institute of Public Administration,Guangzhou Guangdong 510800,China)
出处 《职业教育研究》 2020年第5期37-42,共6页 Vocational Education Research
基金 广东省党校(行政学院)系统哲学社会科学规划2018年度一般课题“大数据环境下高校校园网络空间安全治理研究”(项目编号:18GL12)。
关键词 校园网络空间安全 治理策略 大数据环境 security of university network government strategy big data environment
  • 相关文献

参考文献2

二级参考文献8

  • 1K. POPOVIC, Z. HOCENSKI. Cloud Computing Security Is- sues and Challenges[ C ]//Proceedings of lhe 33rd Internation- al Convention. LA:Prentice Hall, 2010: 344-349.
  • 2B. GARTNER. Seven Cloud- computing Security Risks. NY: Networkworld, 2013 [ 20141105 ]. http://www, networkworld. conWartMe/2281535/data- center/gartner - - seven - cloud - computing-security-risks.html.
  • 3E. SANGER, T. SHANKER. N.S.A. Devises Radio Pathway Into Computers. NY : Nvtimes, 2014 [ 20141105 ]. http ://www. nytimes.conW2014/01 / 15/un/nsa-efforl- pries-open- conlput- ers-not-connected-to-internet.html.
  • 4AmazonSecurity White Paper. LA : Amazon, 2012 [ 20141105 ]. http://awsmedia, s3. amazonaws, com/pdf/AWS security Whitepaper. pdf.
  • 5S. NKRISHNA, P. GUMMADI, R. RODRIUES. Towards Trusted Cloud Computing. GM: MP1,2010 [ 20141105 ] . http://www.mpi- sws. org? - gummadi? papers? trusted _cloud. pdf.
  • 6CSA 3.0.Security Guidanee for Critical Areas of Focus in Cloud Computing. NY: CSA, 2013 [ 20141105 ]. https://cloudsecu- rityallianee.org/guidanee/esaguide.v3.0.pdf.
  • 7陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348. 被引量:1310
  • 8冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1067

共引文献12

同被引文献60

引证文献6

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部