当前位置:网站首页>Xin'an Second Edition: Chapter 26 big data security demand analysis and security protection engineering learning notes
Xin'an Second Edition: Chapter 26 big data security demand analysis and security protection engineering learning notes
2022-07-06 17:34:00 【Moon Dream Studio】
One 、 The outline of this chapter requires
9. Big data security demand analysis and security protection engineering
9.1 Big data security threat and demand analysis
9.1.1 Big data security threat analysis
◆ Concept and characteristics of big data ◆ Big data security
9.1.2 Big data security requirements analysis
◆ Basic requirements for data security ( The authenticity of the data 、 The real time 、 Confidentiality 、 integrity 、 Usability 、 traceability )
◆ Big data security compliance
◆ Big data cross-border security
◆ Big data privacy protection
◆ Big data processing platform security
◆ Big data business security
◆ Secure operation of big data
9.2 Big data security protection mechanism and technical scheme
9.2.1 Big data self security protection technology
◆ Data source authentication ◆ Data traceability ◆ Data user identification and identification ◆ Data resource access control
9.2.2 Big data platform security protection technology
◆ Big data platform border security
◆ Big data network communication security
◆ Identity authentication and authority management of big data users
◆ Big data computing security
◆ Big data platform emergency disaster recovery
◆ Big data audit and monitoring
9.2.3 Big data service security protection technology
◆ Business authorization ◆ Business logic security ◆ Sensitive data security check
9.2.4 Big data privacy security protection technology
◆ Data identity anonymity ◆ Data differential privacy ◆ Data desensitization ◆ Data encryption ◆ Data access control
9.2.5 Big data operation security protection technology
◆ Security maintenance of big data processing system
◆ Big data processing system security policy update
◆ Big data processing system security equipment configuration
◆ Big data processing system security event monitoring and emergency response
◆ Big data processing system intrusion detection and network security situational awareness
◆ Big data processing system network attack forensics
◆ Big data processing system security audit 、 Safety fortress machine
◆ Disaster recovery backup of big data processing system
9.2.6 Big data security management and Standards
◆ Big data security level protection and understanding of relevant standards and specifications
<边栏推荐
- 【MySQL入门】第四话 · 和kiko一起探索MySQL中的运算符
- JVM垃圾回收概述
- SQL调优小记
- MySQL advanced (index, view, stored procedure, function, password modification)
- 自动化运维利器ansible基础
- [reverse intermediate] eager to try
- Flink源码解读(一):StreamGraph源码解读
- Flink analysis (I): basic concept analysis
- 自动答题 之 Selenium测试直接运行在浏览器中,就像真正的用户在操作一样。
- JVM 垃圾回收器之Serial SerialOld ParNew
猜你喜欢
随机推荐
Flink源码解读(三):ExecutionGraph源码解读
Akamai talking about risk control principles and Solutions
SQL tuning notes
MySQL basic addition, deletion, modification and query of SQL statements
Vscode matches and replaces the brackets
JVM 垃圾回收器之Serial SerialOld ParNew
连接局域网MySql
数据仓库建模使用的模型以及分层介绍
[mmdetection] solves the installation problem
Deploy flask project based on LNMP
[reverse intermediate] eager to try
Flink analysis (II): analysis of backpressure mechanism
JVM garbage collector part 1
Flink 解析(三):内存管理
学习投资大师的智慧
【逆向】脱壳后修复IAT并关闭ASLR
Models used in data warehouse modeling and layered introduction
Akamai anti confusion
List set data removal (list.sublist.clear)
[VNCTF 2022]ezmath wp









