当前位置:网站首页>[case sharing] let the development of education in the new era advance with "number"
[case sharing] let the development of education in the new era advance with "number"
2022-07-03 00:48:00 【shipinginfo】
With “ Digital China ” The continuous advancement of the strategy , The wave of digital reform has swept all walks of life in China , It's about national development 、 How will the nation's future education industry relate to new technologies 、 The integration and development of new ideas has attracted social attention . In order to further promote the development of educational informatization in the new era , Cultivate new engines of innovation driven development , Consolidate the ability of education data security protection , A Provincial Department of education joined hands with Shiping information to carry out sensitive data leakage risk monitoring project , Strengthen the security of all kinds of sensitive data in the information data center , Provide strong support for the development of educational informatization .
Policies and regulations Point out the direction

In recent years , China is trying to build “ Internet +” A new mode of talent training under the condition of 、 Develop a new model of educational services based on the Internet 、 While exploring the new model of educational governance in the information age , Pay more attention to the security of educational data .《 Education Informatization 2.0 A plan of action 》《2019 Key points of education informatization and network security in 》《 Notice on strengthening the informatization of education management in the new era 》《 Notice on strengthening data security of education system 》 And a series of laws and regulations have been issued , The security management of educational data has been pushed to the front line of digital construction in the education industry , The data security construction of China's education industry is gradually based .
· 《 Education Informatization 2.0 A plan of action 》
With 《 Network security law 》 And other laws and regulations , Comprehensively improve the network security protection ability of the education system . Ensure key information infrastructure , Focus on ensuring data and information security , Strengthen privacy protection , Establish close protection 、 Open layer by layer 、 A benign mechanism for orderly sharing , Earnestly safeguard the vital interests of teachers and students .
· 《2019 Key points of education informatization and network security in 》
Strengthen the data security protection ability of the education system , Establish the working mechanism of data classification guarantee , Strengthen data lifecycle management . Carry out special rectification actions for data security , Comprehensively check the security risks of personal information protection .
· 《 Notice on strengthening the informatization of education management in the new era 》
Improve the education data management system , Establish data standard system , Standardize data acquisition 、 Storage transmission 、 Use processing 、 Open sharing and other full life cycle data activities . Carry out data classification and grading , Form a data traceability map , Define the data source of all kinds of data .
· 《 Notice on strengthening data security of education system 》
Establish a data security responsibility system and a data classification and grading system for the education system , Form a directory of data resources of the education system . Improve coverage data collection 、 Transport storage 、 Use processing 、 Open sharing and other full life cycle data security guarantee systems . Comprehensively strengthen the ability of data security protection , Improve the management level of data security and legal compliance , Strongly support the development of Education .
Business upgrade Release demand
In order to meet the needs of the development of educational informatization , A provincial education department has established a provincial information data center , The center contains dozens of information business systems , The system users cover all cities under its jurisdiction 、 county ( City / District ) Bureau of education , It collects and stores faculty 、 A lot of sensitive information about students and their parents .
In view of the frequent information query in the daily operation of business 、 Downloading and other data request behaviors , A Provincial Department of education to ensure data security , A relatively perfect border security protection system and audit measures have been established , However, the traditional network security protection technology is difficult to check and analyze all the operation behaviors of the system one by one , Unable to effectively identify user account theft or remote login 、 Abnormal conditions such as staff's illegal query or download . therefore , There is a security risk of system data leakage or theft .
Technical support Safety escort

Guided by relevant policies and regulations , Starting from the current situation of data security of a Provincial Department of Education , Siping information has put forward the solution of sensitive data leakage risk monitoring system , Carry out all-round security monitoring on the daily use of the information business system of a Provincial Department of Education , Discover the abnormal use behavior of system users in time , Comprehensively ensure the data security of the business system .
· Network traffic analysis
Deploy the network data leakage protection system in the user environment (NDLP), Mirror the business flow generated by each business system and analyze user operation behavior , adopt IP Address 、 Location 、 conversation ID And other information to identify whether the account has illegal login .
· Abnormal behavior warning
Identify the business data sensitive content of network circulation , Analyze user exception queries 、 Sensitive contents and times of downloaded files , A security event occurs when the set threshold is exceeded .
· Alarm information notification
Establish information system security warning mechanism , When a security event occurs in the system , According to the severity of the incident , The system can automatically alert users by SMS or email .
· Customize data statistics report
Customize the data report system according to user needs , Automatically generate safety reports periodically on demand , For relevant business leaders to analyze and make decisions .
Security Governance Value appears
· Establish a real-time monitoring system , Eliminate the risk of data leakage
Effectively identify sensitive data , And conduct real-time control over the use and disclosure of sensitive data , Give timely warning of abnormal access or circulation of business systems , And ensure that data processing behavior is auditable 、 Traceability .
· Strengthen the construction of data compliance , Improve the efficiency of safety management
Strengthen data compliance risk awareness , Ensure that the user's information business systems meet the national and industrial data security compliance requirements , Strengthen the compliance construction and security application of sensitive data , Let data security be implemented in daily work , Reduce the occurrence of safety events .
The transformation of digital education is 2022 In the field of Education “ key word ”, With the start of digital education strategy , Deepen the reform of Digital Education , Empowering the overall intellectual governance of the education industry , It is a new mission entrusted by the new era to the development of Education . Shiping information will also keep up with the pace of the times , Focus on the full life cycle compliance control and safety protection of data in various industries , Escort the construction and development of Digital China .
边栏推荐
- Nacos+openfeign error reporting solution
- Centos7 one click compilation to build MySQL script
- Callback event after the antv X6 node is dragged onto the canvas (stepping on a big hole record)
- node_ Modules cannot be deleted
- 【AutoSAR 六 描述文件】
- ftrace工具的介绍及使用
- An excellent orm in dotnet circle -- FreeSQL
- [golang syntax] map common errors golang panic: assignment to entry in nil map
- Vulkan practice first bullet
- 利亚德:Micro LED 产品消费端首先针对 100 英寸以上电视,现阶段进入更小尺寸还有难度
猜你喜欢

Introduction and use of ftrace tool

Vulkan-实践第一弹

Why is the website slow to open?

【AutoSAR 一 概述】

百度智能云牵头打造智能云综合标准化平台

AEM: Nanlin fan Ben et al. - plant rhizosphere growth promoting bacteria control soybean blight

Arduino开发之按键检测与正弦信号输出

【雅思阅读】王希伟阅读P1(阅读判断题)

Illustrated network: what is virtual router redundancy protocol VRRP?
![[shutter] image component (load network pictures | load static pictures | load local pictures | path | provider plug-in)](/img/7e/4f9d96edd04e9ffb26434baf34aa43.jpg)
[shutter] image component (load network pictures | load static pictures | load local pictures | path | provider plug-in)
随机推荐
【AutoSAR 五 方法论】
University of Oslo: Li Meng | deep reinforcement learning based on swing transformer
Liad: the consumer end of micro LED products is first targeted at TVs above 100 inches. At this stage, it is still difficult to enter a smaller size
Vulkan并非“灵药“
Kubernetes resource object introduction and common commands (V) - (NFS & PV & PVC)
指针进阶(一)
lex && yacc && bison && flex 配置的问题
Shell implements basic file operations (cutting, sorting, and de duplication)
leetcode-934:最短的桥
【JetCache】JetCache的配置说明和注解属性说明
FAQ | FAQ for building applications for large screen devices
MySQL 23 classic interview hanging interviewer
Thread start and priority
Rust ownership (very important)
Rust字符串切片、结构体和枚举类
百数不断创新,打造自由的低代码办公工具
[jetcache] jetcache configuration description and annotation attribute description
Gan model architecture in mm
Leetcode-1964: find the longest effective obstacle race route to each position
Detailed explanation of pod life cycle