当前位置:网站首页>Data security knowledge system
Data security knowledge system
2022-07-26 18:34:00 【wangmcn】
Data security knowledge system
Catalog
1、 Data security legislation
2、 Data security lifecycle
2.1、 Data collection security
2.2、 Data storage security
2.3、 Data transmission security
2.4、 Data access security
2.5、 Data exchange security
2.6、 Data destruction security
1、 Data security legislation
2019 year 12 month 30 Japan , About Printing 《App Identification method of illegal collection and use of personal information 》 The notice of .
Revised by China Institute of electronic technology standardization 《 Information security technology personal information security specifications 》 Has been officially approved for release , The implementation time is 2020 year 10 month 1 Japan , replace GB/T35273-2017 Version national standard .
《 Information security technology network security level protection basic requirements for big data 》(T/ISEAA002-2021) The group standard was officially released , since 2021 year 5 month 30 Effective from .
2021 year 6 month 10 Japan , Adopted at the 29th meeting of the Standing Committee of the 13th National People's Congress 《 Data security law of the people's Republic of China 》, since 2021 year 9 month 1 The effective date .
National Internet Information Office 、 National development and reform commission 、 Ministry of industry and information technology 、 The Ministry of Public Security 、 Jointly issued by the Ministry of transport 《 Several regulations on vehicle data security management ( On a trial basis )》, since 2021 year 10 month 1 The effective date .
2021 year 8 month 20 Adopted at the 30th meeting of the Standing Committee of the 13th National People's Congress on November .《 Personal information protection law 》 since 2021 year 11 month 1 The effective date .
2、 Data security lifecycle
2.1、 Data collection security
1、 The security and credibility of the data source 、 Identification 、 User authorization
2、 Personal information and important data are evaluated before collection
3、 Collection process safety compliance 、 logging
4、 Privacy data 、 Sensitive data identification and leakage prevention
5、 Collection tools or equipment should be safely managed 、 Access control, etc
2.2、 Data storage security
1、 Data classification
2、 Storage area and isolation
3、 Encrypted storage
4、 Storage platform or system account 、 password 、 jurisdiction 、 security management
5、 Password protection 、 Key management
6、 Log management
7、 Store backup
8、 Data recovery
9、 Data archiving
2.3、 Data transmission security
1、 Transmission encryption
2、 Network availability management
3、 Transmission interface control
4、 Interface call log management
2.4、 Data access security
1、 Data classification
2、 Data access rights
3、 Data query authority division
4、 Print / Download permissions
5、 Data desensitization
2.5、 Data exchange security
1、 Data interface configuration
2、 Log management and monitoring audit
3、 Document labels
4、 Data encryption 、 data compression
5、 Desensitization of sensitive data
6、 Exchange process validation
7、 Digital watermark
2.6、 Data destruction security
1、 Data content is safely destroyed
2、 User logout
3、 The key is safely destroyed
边栏推荐
- 【在 Kotlin 中添加条件行为】
- Sword finger offer regular expression matching
- Is it safe for me to open the securities account of CITIC and find the channel manager?
- How to switch nodejs versions at will?
- ssm练习第二天_项目拆分moudle_基本增删改查_批量删除_一对一级联查询
- If the recommendation effect is not satisfactory, it's better to try to learn the propeller chart
- 测试组如何进行QA规范
- LeetCode 0139. 单词拆分
- MySQL 遇到过死锁问题吗,你是如何解决的?
- 被控专利授权费过高!美法院判决高通违反反垄断法:高通股价大跌10.86%!
猜你喜欢

Redis master-slave replication, read-write separation, sentinel mode

ssm练习第四天_获取用户名_用户退出_用户crud_密码加密_角色_权限

Become a test / development programmer, Xiao Zhang: reality is coming

Nailing third-party service provider application ISV application development and listing tutorial

更安全、更健康、无续航焦虑,魏牌拿铁DHT-PHEV来了

链表-两个链表的第一个公共结点

复现gallerycms字符长度限制短域名绕过

百度飞桨EasyDL X 韦士肯:看轴承质检如何装上“AI之眼”

The third day of SSM practice_ Paging assistant_ Security framework

LeetCode50天刷题计划(Day 5—— 最长回文子串 10.50-13:00)
随机推荐
Become a test / development programmer, Xiao Zhang: reality is coming
LeetCode50天刷题计划(Day 1—— 两数相加 11.00-12.30)
钉钉第三方服务商应用ISV应用开发及上架教程
ALV屏幕输入选项学习
Data warehouse: fact table of detailed dimensional modeling
College personnel management system based on jsp+servlet
ssm练习第三天_分页助手_安全框架
LeetCode 0137. 只出现一次的数字 II
Leetcode 50 day question brushing plan (day 2 - the longest substring without repeated characters 10.00-12.00)
ICML 2022 (Part 4) | | graph hierarchical alignment graph kernel to realize graph matching
Apartment rental system based on JSP
效率提升98%!高海拔光伏电站运维巡检背后的AI利器
网易游戏研发工程师实习生(客户端方向)一面
常用功能的测试用例
Ten year structure five year life-06 impulse to leave
Maximum sum of continuous subarray of sword finger offer (2)
Leetcode 0137. number II that appears only once
推荐效果不如意,不如试试飞桨图学习
剑指offer 连续子数组的最大和(二)
Some tips for printing logs