当前位置:网站首页>Xin'an Second Edition: Chapter 26 big data security demand analysis and security protection engineering learning notes
Xin'an Second Edition: Chapter 26 big data security demand analysis and security protection engineering learning notes
2022-07-06 17:34:00 【Moon Dream Studio】
One 、 The outline of this chapter requires
9. Big data security demand analysis and security protection engineering
9.1 Big data security threat and demand analysis
9.1.1 Big data security threat analysis
◆ Concept and characteristics of big data ◆ Big data security
9.1.2 Big data security requirements analysis
◆ Basic requirements for data security ( The authenticity of the data 、 The real time 、 Confidentiality 、 integrity 、 Usability 、 traceability )
◆ Big data security compliance
◆ Big data cross-border security
◆ Big data privacy protection
◆ Big data processing platform security
◆ Big data business security
◆ Secure operation of big data
9.2 Big data security protection mechanism and technical scheme
9.2.1 Big data self security protection technology
◆ Data source authentication ◆ Data traceability ◆ Data user identification and identification ◆ Data resource access control
9.2.2 Big data platform security protection technology
◆ Big data platform border security
◆ Big data network communication security
◆ Identity authentication and authority management of big data users
◆ Big data computing security
◆ Big data platform emergency disaster recovery
◆ Big data audit and monitoring
9.2.3 Big data service security protection technology
◆ Business authorization ◆ Business logic security ◆ Sensitive data security check
9.2.4 Big data privacy security protection technology
◆ Data identity anonymity ◆ Data differential privacy ◆ Data desensitization ◆ Data encryption ◆ Data access control
9.2.5 Big data operation security protection technology
◆ Security maintenance of big data processing system
◆ Big data processing system security policy update
◆ Big data processing system security equipment configuration
◆ Big data processing system security event monitoring and emergency response
◆ Big data processing system intrusion detection and network security situational awareness
◆ Big data processing system network attack forensics
◆ Big data processing system security audit 、 Safety fortress machine
◆ Disaster recovery backup of big data processing system
9.2.6 Big data security management and Standards
◆ Big data security level protection and understanding of relevant standards and specifications
<边栏推荐
- Program counter of JVM runtime data area
- PySpark算子处理空间数据全解析(4): 先说说空间运算
- Vscode matches and replaces the brackets
- CTF reverse entry question - dice
- 基于LNMP部署flask项目
- MySQL advanced (index, view, stored procedure, function, password modification)
- vscode
- TCP连接不止用TCP协议沟通
- C WinForm series button easy to use
- JVM garbage collector part 2
猜你喜欢
随机推荐
复盘网鼎杯Re-Signal Writeup
vscode
Only learning C can live up to expectations top3 demo exercise
04个人研发的产品及推广-数据推送工具
Akamai浅谈风控原理与解决方案
Flink 解析(五):State与State Backend
Flink 解析(六):Savepoints
JVM garbage collector part 1
Flink 解析(七):时间窗口
PySpark算子处理空间数据全解析(5): 如何在PySpark里面使用空间运算接口
Total / statistics function of MySQL
Only learning C can live up to expectations top2 P1 variable
Flink 解析(二):反压机制解析
肖申克的救赎有感
February database ranking: how long can Oracle remain the first?
Flink源码解读(三):ExecutionGraph源码解读
数据仓库建模使用的模型以及分层介绍
List集合数据移除(List.subList.clear)
Automatic operation and maintenance sharp weapon ansible Playbook
03个人研发的产品及推广-计划服务配置器V3.0








