This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
With introducting two testing indices of ECMRS,behavior modal of the contract enterprise and the state in ECMRS are in our paper,then two connive models of ECMRS are made by introducing an audit technique as a means o...With introducting two testing indices of ECMRS,behavior modal of the contract enterprise and the state in ECMRS are in our paper,then two connive models of ECMRS are made by introducing an audit technique as a means of acquiring information Moreover,a general rule which determines optimal strategy with perfect informtion is also given.展开更多
传统教育大数据管理面临隐私数据泄露、数据可信度存疑和越权访问等安全风险,为了避免上述风险,提出了一种新型基于智能合约的教育大数据安全管理与隐私保护算法:ASPES(algorithm for security management and privacy protection of ed...传统教育大数据管理面临隐私数据泄露、数据可信度存疑和越权访问等安全风险,为了避免上述风险,提出了一种新型基于智能合约的教育大数据安全管理与隐私保护算法:ASPES(algorithm for security management and privacy protection of education big data based on smart contracts),算法融合了基于Shamir秘密共享的密钥切割改进分享算法、基于SM2-SHA256-AES算法的混合加密算法和基于分层数据访问控制的智能合约管理算法.在真实数据集MOOCCube上的实验结果表明,相较于较先进的方法,ASPES的执行效率和安全性有显著提高,可以有效存储和管理教育大数据,实现教育资源的合理分配.ASPES通过向区块链中嵌入智能合约,将数据读写等操作上链,能够优化管理路径、提高管理效率,保证教育公平,极大地提升教育质量.展开更多
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘With introducting two testing indices of ECMRS,behavior modal of the contract enterprise and the state in ECMRS are in our paper,then two connive models of ECMRS are made by introducing an audit technique as a means of acquiring information Moreover,a general rule which determines optimal strategy with perfect informtion is also given.
文摘传统教育大数据管理面临隐私数据泄露、数据可信度存疑和越权访问等安全风险,为了避免上述风险,提出了一种新型基于智能合约的教育大数据安全管理与隐私保护算法:ASPES(algorithm for security management and privacy protection of education big data based on smart contracts),算法融合了基于Shamir秘密共享的密钥切割改进分享算法、基于SM2-SHA256-AES算法的混合加密算法和基于分层数据访问控制的智能合约管理算法.在真实数据集MOOCCube上的实验结果表明,相较于较先进的方法,ASPES的执行效率和安全性有显著提高,可以有效存储和管理教育大数据,实现教育资源的合理分配.ASPES通过向区块链中嵌入智能合约,将数据读写等操作上链,能够优化管理路径、提高管理效率,保证教育公平,极大地提升教育质量.