当前位置:网站首页>Data security knowledge system
Data security knowledge system
2022-07-26 18:34:00 【wangmcn】
Data security knowledge system
Catalog
1、 Data security legislation
2、 Data security lifecycle
2.1、 Data collection security
2.2、 Data storage security
2.3、 Data transmission security
2.4、 Data access security
2.5、 Data exchange security
2.6、 Data destruction security
1、 Data security legislation
2019 year 12 month 30 Japan , About Printing 《App Identification method of illegal collection and use of personal information 》 The notice of .
Revised by China Institute of electronic technology standardization 《 Information security technology personal information security specifications 》 Has been officially approved for release , The implementation time is 2020 year 10 month 1 Japan , replace GB/T35273-2017 Version national standard .
《 Information security technology network security level protection basic requirements for big data 》(T/ISEAA002-2021) The group standard was officially released , since 2021 year 5 month 30 Effective from .
2021 year 6 month 10 Japan , Adopted at the 29th meeting of the Standing Committee of the 13th National People's Congress 《 Data security law of the people's Republic of China 》, since 2021 year 9 month 1 The effective date .
National Internet Information Office 、 National development and reform commission 、 Ministry of industry and information technology 、 The Ministry of Public Security 、 Jointly issued by the Ministry of transport 《 Several regulations on vehicle data security management ( On a trial basis )》, since 2021 year 10 month 1 The effective date .
2021 year 8 month 20 Adopted at the 30th meeting of the Standing Committee of the 13th National People's Congress on November .《 Personal information protection law 》 since 2021 year 11 month 1 The effective date .
2、 Data security lifecycle
2.1、 Data collection security
1、 The security and credibility of the data source 、 Identification 、 User authorization
2、 Personal information and important data are evaluated before collection
3、 Collection process safety compliance 、 logging
4、 Privacy data 、 Sensitive data identification and leakage prevention
5、 Collection tools or equipment should be safely managed 、 Access control, etc
2.2、 Data storage security
1、 Data classification
2、 Storage area and isolation
3、 Encrypted storage
4、 Storage platform or system account 、 password 、 jurisdiction 、 security management
5、 Password protection 、 Key management
6、 Log management
7、 Store backup
8、 Data recovery
9、 Data archiving
2.3、 Data transmission security
1、 Transmission encryption
2、 Network availability management
3、 Transmission interface control
4、 Interface call log management
2.4、 Data access security
1、 Data classification
2、 Data access rights
3、 Data query authority division
4、 Print / Download permissions
5、 Data desensitization
2.5、 Data exchange security
1、 Data interface configuration
2、 Log management and monitoring audit
3、 Document labels
4、 Data encryption 、 data compression
5、 Desensitization of sensitive data
6、 Exchange process validation
7、 Digital watermark
2.6、 Data destruction security
1、 Data content is safely destroyed
2、 User logout
3、 The key is safely destroyed
边栏推荐
- J9数字论:如何避免踩雷多头陷阱?
- The first day of Oracle (review and sort out the common knowledge points of development)
- Leetcode 0139. word splitting
- Redis master-slave replication, read-write separation, sentinel mode
- MPLS实验
- 链表-倒数最后k个结点
- 模块八作业 - 消息数据 MySQL 表设计
- 【英雄哥七月集训】第 25天: 树状数组
- [a little knowledge] thread pool
- Vector CANape - How to Send Receive CAN Message in CANape
猜你喜欢

8.1 Diffie Hellman key exchange

Efficiency increased by 98%! AI weapon behind operation and maintenance inspection of high altitude photovoltaic power station

更安全、更健康、无续航焦虑,魏牌拿铁DHT-PHEV来了

The first day of Oracle (review and sort out the common knowledge points of development)

剑指offer 正则表达式匹配

Apartment rental system based on JSP

Oracle day 2 (Views, indexes, PLSQL, cursors, stored procedures and stored functions, triggers, JDBC access stored procedures and stored functions)

俄语翻译的就业前景怎样 如何做好俄语翻译工作

ALV屏幕输入选项学习

ssm练习第三天_分页助手_安全框架
随机推荐
LeetCode50天刷题计划(Day 3—— 串联所有单词的子串 10.00-13.20)
隐私计算基础组件系列-混淆电路
How to switch nodejs versions at will?
PS_2_图层
《圆圈正义》的信念
LeetCode50天刷题计划(Day 2—— 无重复字符的最长子串 10.00-12.00)
被控专利授权费过高!美法院判决高通违反反垄断法:高通股价大跌10.86%!
剑指offer 跳台阶扩展问题
ICML 2022(第四篇)|| 图分层对齐图核实现图匹配
PyQt5快速开发与实战 3.5 菜单栏与工具栏
College personnel management system based on jsp+servlet
还在用Xshell?推荐这个更现代的终端连接工具
SQL determines whether a column contains Chinese characters, English characters, pure numbers, and data interception
LeetCode50天刷题计划(Day 1—— 两数相加 11.00-12.30)
【Unity3D】摇杆
钉钉第三方服务商应用ISV应用开发及上架教程
OpenGL中的视差贴图的着色器代码
[a little knowledge] thread pool
数据仓库:详解维度建模之事实表
mpc5744p烧录到98%无法继续下载程序