期刊文献+

移动互联网安全现状及应对策略

The Security Status of Mobile Internet and Countermeasures
下载PDF
导出
摘要 随着互联网技术和移动终端的快速发展,移动互联网的发展无论从规模还是速度上都实现了质的飞跃。人们通过智能移动终端来参与互联网活动已经成为参与网络活动的主要方式,而移动互联网的多样性也带来了很多的安全问题,主要体现在移动互联网自身存在的安全隐患以及用户缺乏安全意识两个方面。本文对移动互联网的安全问题进行了深入分析,同时从安全立法、标准制定、新技术应用、移动终端管理、加大投入、移动应用商店的安全管理、增强用户的安全意识等方面提出了一些应对移动互联网安全问题的策略,仅供参考。 With the rapid development of Internet technology and mobile terminals,the development of mobile Internet has achieved a qualitative leap in both scale and speed.People participate in Internet activities through intelligent mobile terminals has become the main way to participate in network activities,and the diversity of mobile Internet has also brought a lot of security problems,mainly reflected in the security risks of mobile Internet itself and the lack of security awareness of users.In this paper,the security issues of mobile Internet are analyzed in depth.At the same time,some strategies to deal with the security problems of mobile Internet are proposed from the aspects of security legislation,standard formulation,new technology application,mobile terminal management,increasing investment,security management of mobile app store,and enhancing the safety aw areness of users.
作者 秦墨涵 Qin Mohan(School of Information and Software,University of Electronic Science and Technology of China,Chengdu Sichuan 610054,C hina)
出处 《信息与电脑》 2020年第21期186-188,共3页 Information & Computer
关键词 移动互联网 安全问题 应对策略 mobile internet safety issues coping strategies
  • 相关文献

参考文献4

二级参考文献17

  • 1IETF. The OAuth 2. 0 authorization framework [ EB/OL ].[2014-04-30] .http : // tools.ietf.org/html/rfc6749.
  • 2Stinson D H.密码学原理与实践[M].2版.冯登国,译.北京:电子工业出版社,2005.
  • 3安慧科技.OpenSSL心脏出血漏洞全回顾[EB/OL].[2014-04-25 ]. http: // www. freebuf. com/articles/network/32171. html.
  • 4Lodderstedt T,McGloin M,Hunt P. OAuth 2.0 threatmodel and security considerations [ EB/OL]. [ 2014-03-30] .http: //tools.ietf.org/html/rfc6819.
  • 5IETF.The OAuth 2.0 authorization framework : Bearertoken usage[ EB/OL]. [ 2014-04-30] .http : //self-issued,info/docs/draft-ietf-oauth-v2-bearer.html.
  • 6Shrawankar M, Shrivastava A K. Comparative study of se-curity mechanisms in multi-cloud environment [ J ]. Inter-national Journal of Computer Applications, 2013,77 (6):9-13.
  • 7Wang C,Chow S S M,Wang Q,et al.Privacy-preservingpublic auditing for secure cloud storage [ J ]. IEEE Trans-actions on Computers, 2013,62 (2) : 362-375.
  • 8Bessani A,Correia M,Quaresma B, et al. DepSky: De-pendable and secure storage in a cloud-of-clouds [ C ] //Proc of the 6th Conf on Computer System. New York:ACM,2011:31-46.
  • 9张驰.互联网信息安全问题及其对策[J].北京邮电大学学报(社会科学版),2009,11(5):21-27. 被引量:7
  • 10冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部