当前位置:网站首页>Xin'an Second Edition: Chapter 26 big data security demand analysis and security protection engineering learning notes
Xin'an Second Edition: Chapter 26 big data security demand analysis and security protection engineering learning notes
2022-07-06 17:34:00 【Moon Dream Studio】
One 、 The outline of this chapter requires
9. Big data security demand analysis and security protection engineering
9.1 Big data security threat and demand analysis
9.1.1 Big data security threat analysis
◆ Concept and characteristics of big data ◆ Big data security
9.1.2 Big data security requirements analysis
◆ Basic requirements for data security ( The authenticity of the data 、 The real time 、 Confidentiality 、 integrity 、 Usability 、 traceability )
◆ Big data security compliance
◆ Big data cross-border security
◆ Big data privacy protection
◆ Big data processing platform security
◆ Big data business security
◆ Secure operation of big data
9.2 Big data security protection mechanism and technical scheme
9.2.1 Big data self security protection technology
◆ Data source authentication ◆ Data traceability ◆ Data user identification and identification ◆ Data resource access control
9.2.2 Big data platform security protection technology
◆ Big data platform border security
◆ Big data network communication security
◆ Identity authentication and authority management of big data users
◆ Big data computing security
◆ Big data platform emergency disaster recovery
◆ Big data audit and monitoring
9.2.3 Big data service security protection technology
◆ Business authorization ◆ Business logic security ◆ Sensitive data security check
9.2.4 Big data privacy security protection technology
◆ Data identity anonymity ◆ Data differential privacy ◆ Data desensitization ◆ Data encryption ◆ Data access control
9.2.5 Big data operation security protection technology
◆ Security maintenance of big data processing system
◆ Big data processing system security policy update
◆ Big data processing system security equipment configuration
◆ Big data processing system security event monitoring and emergency response
◆ Big data processing system intrusion detection and network security situational awareness
◆ Big data processing system network attack forensics
◆ Big data processing system security audit 、 Safety fortress machine
◆ Disaster recovery backup of big data processing system
9.2.6 Big data security management and Standards
◆ Big data security level protection and understanding of relevant standards and specifications
<边栏推荐
- CTF逆向入门题——掷骰子
- Automatic operation and maintenance sharp weapon ansible Foundation
- 07个人研发的产品及推广-人力资源信息管理系统
- Vscode matches and replaces the brackets
- [ciscn 2021 South China]rsa writeup
- Akamai anti confusion
- Display picture of DataGridView cell in C WinForm
- 自动答题 之 Selenium测试直接运行在浏览器中,就像真正的用户在操作一样。
- Wu Jun's trilogy experience (VII) the essence of Commerce
- Program counter of JVM runtime data area
猜你喜欢
02 personal developed products and promotion - SMS platform
03个人研发的产品及推广-计划服务配置器V3.0
07 personal R & D products and promotion - human resources information management system
Program counter of JVM runtime data area
手把手带你做强化学习实验--敲级详细
C#版Selenium操作Chrome全屏模式显示(F11)
Akamai 反混淆篇
Application service configurator (regular, database backup, file backup, remote backup)
当前系统缺少NTFS格式转换器(convert.exe)
自动答题 之 Selenium测试直接运行在浏览器中,就像真正的用户在操作一样。
随机推荐
MySQL Advanced (index, view, stored procedures, functions, Change password)
MySQL basic addition, deletion, modification and query of SQL statements
Final review of information and network security (based on the key points given by the teacher)
SQL调优小记
应用服务配置器(定时,数据库备份,文件备份,异地备份)
C WinForm series button easy to use
分布式(一致性协议)之领导人选举( DotNext.Net.Cluster 实现Raft 选举 )
基于Infragistics.Document.Excel导出表格的类
Wu Jun's trilogy insight (V) refusing fake workers
JUnit unit test
Uipath browser performs actions in the new tab
Selenium test of automatic answer runs directly in the browser, just like real users.
JVM垃圾回收概述
The NTFS format converter (convert.exe) is missing from the current system
vscode
全网最全tcpdump和Wireshark抓包实践
mysql 基本增删改查SQL语句
Flink 解析(二):反压机制解析
mysql的列的数据类型详解
Flink parsing (VII): time window