当前位置:网站首页>Xin'an Second Edition: Chapter 26 big data security demand analysis and security protection engineering learning notes
Xin'an Second Edition: Chapter 26 big data security demand analysis and security protection engineering learning notes
2022-07-06 17:34:00 【Moon Dream Studio】
One 、 The outline of this chapter requires
9. Big data security demand analysis and security protection engineering
9.1 Big data security threat and demand analysis
9.1.1 Big data security threat analysis
◆ Concept and characteristics of big data ◆ Big data security
9.1.2 Big data security requirements analysis
◆ Basic requirements for data security ( The authenticity of the data 、 The real time 、 Confidentiality 、 integrity 、 Usability 、 traceability )
◆ Big data security compliance
◆ Big data cross-border security
◆ Big data privacy protection
◆ Big data processing platform security
◆ Big data business security
◆ Secure operation of big data
9.2 Big data security protection mechanism and technical scheme
9.2.1 Big data self security protection technology
◆ Data source authentication ◆ Data traceability ◆ Data user identification and identification ◆ Data resource access control
9.2.2 Big data platform security protection technology
◆ Big data platform border security
◆ Big data network communication security
◆ Identity authentication and authority management of big data users
◆ Big data computing security
◆ Big data platform emergency disaster recovery
◆ Big data audit and monitoring
9.2.3 Big data service security protection technology
◆ Business authorization ◆ Business logic security ◆ Sensitive data security check
9.2.4 Big data privacy security protection technology
◆ Data identity anonymity ◆ Data differential privacy ◆ Data desensitization ◆ Data encryption ◆ Data access control
9.2.5 Big data operation security protection technology
◆ Security maintenance of big data processing system
◆ Big data processing system security policy update
◆ Big data processing system security equipment configuration
◆ Big data processing system security event monitoring and emergency response
◆ Big data processing system intrusion detection and network security situational awareness
◆ Big data processing system network attack forensics
◆ Big data processing system security audit 、 Safety fortress machine
◆ Disaster recovery backup of big data processing system
9.2.6 Big data security management and Standards
◆ Big data security level protection and understanding of relevant standards and specifications
<边栏推荐
- Yarn: unable to load file d:\programfiles\nodejs\yarn PS1, because running scripts is prohibited on this system
- ByteDance overseas technical team won the championship again: HD video coding has won the first place in 17 items
- Selenium test of automatic answer runs directly in the browser, just like real users.
- 网络分层概念及基本知识
- Final review of information and network security (based on the key points given by the teacher)
- Flink 解析(四):恢复机制
- Solrcloud related commands
- 06个人研发的产品及推广-代码统计工具
- [CISCN 2021 华南赛区]rsa Writeup
- Flink 解析(一):基础概念解析
猜你喜欢
数据仓库建模使用的模型以及分层介绍
Flink 解析(一):基础概念解析
pip install pyodbc : ERROR: Command errored out with exit status 1
Serial serialold parnew of JVM garbage collector
Selenium test of automatic answer runs directly in the browser, just like real users.
About selenium starting Chrome browser flash back
JVM class loading subsystem
Uipath browser performs actions in the new tab
Flink源码解读(二):JobGraph源码解读
CTF reverse entry question - dice
随机推荐
Only learning C can live up to expectations top2 P1 variable
MySQL Advanced (index, view, stored procedures, functions, Change password)
PySpark算子处理空间数据全解析(5): 如何在PySpark里面使用空间运算接口
mysql高级(索引,视图,存储过程,函数,修改密码)
Flink analysis (I): basic concept analysis
Brush questions during summer vacation, ouch ouch
mysql的列的数据类型详解
JVM 垃圾回收器之Serial SerialOld ParNew
基于LNMP部署flask项目
沉淀下来的数据库操作类-C#版(SQL Server)
Automatic operation and maintenance sharp weapon ansible Foundation
05个人研发的产品及推广-数据同步工具
Flink 解析(二):反压机制解析
PySpark算子处理空间数据全解析(4): 先说说空间运算
Only learning C can live up to expectations Top1 environment configuration
C version selenium operation chrome full screen mode display (F11)
Redis quick start
CTF reverse entry question - dice
MySQL advanced (index, view, stored procedure, function, password modification)
Flink 解析(一):基础概念解析