当前位置:网站首页>Xin'an Second Edition: Chapter 26 big data security demand analysis and security protection engineering learning notes
Xin'an Second Edition: Chapter 26 big data security demand analysis and security protection engineering learning notes
2022-07-06 17:34:00 【Moon Dream Studio】
One 、 The outline of this chapter requires
9. Big data security demand analysis and security protection engineering
9.1 Big data security threat and demand analysis
9.1.1 Big data security threat analysis
◆ Concept and characteristics of big data ◆ Big data security
9.1.2 Big data security requirements analysis
◆ Basic requirements for data security ( The authenticity of the data 、 The real time 、 Confidentiality 、 integrity 、 Usability 、 traceability )
◆ Big data security compliance
◆ Big data cross-border security
◆ Big data privacy protection
◆ Big data processing platform security
◆ Big data business security
◆ Secure operation of big data
9.2 Big data security protection mechanism and technical scheme
9.2.1 Big data self security protection technology
◆ Data source authentication ◆ Data traceability ◆ Data user identification and identification ◆ Data resource access control
9.2.2 Big data platform security protection technology
◆ Big data platform border security
◆ Big data network communication security
◆ Identity authentication and authority management of big data users
◆ Big data computing security
◆ Big data platform emergency disaster recovery
◆ Big data audit and monitoring
9.2.3 Big data service security protection technology
◆ Business authorization ◆ Business logic security ◆ Sensitive data security check
9.2.4 Big data privacy security protection technology
◆ Data identity anonymity ◆ Data differential privacy ◆ Data desensitization ◆ Data encryption ◆ Data access control
9.2.5 Big data operation security protection technology
◆ Security maintenance of big data processing system
◆ Big data processing system security policy update
◆ Big data processing system security equipment configuration
◆ Big data processing system security event monitoring and emergency response
◆ Big data processing system intrusion detection and network security situational awareness
◆ Big data processing system network attack forensics
◆ Big data processing system security audit 、 Safety fortress machine
◆ Disaster recovery backup of big data processing system
9.2.6 Big data security management and Standards
◆ Big data security level protection and understanding of relevant standards and specifications
<边栏推荐
- mysql高级(索引,视图,存储过程,函数,修改密码)
- TCP connection is more than communicating with TCP protocol
- 华为认证云计算HICA
- 02个人研发的产品及推广-短信平台
- Interpretation of Flink source code (I): Interpretation of streamgraph source code
- 连接局域网MySql
- 信息与网络安全期末复习(基于老师给的重点)
- JVM garbage collection overview
- Grafana 9 正式发布,更易用,更酷炫了!
- The problem of "syntax error" when uipath executes insert statement is solved
猜你喜欢
Uipath browser performs actions in the new tab
华为认证云计算HICA
Flink analysis (I): basic concept analysis
【ASM】字节码操作 ClassWriter 类介绍与使用
Solr appears write Lock, solrexception: could not get leader props in the log
Wu Jun's trilogy experience (VII) the essence of Commerce
07 personal R & D products and promotion - human resources information management system
Grafana 9 正式发布,更易用,更酷炫了!
微信防撤回是怎么实现的?
TCP连接不止用TCP协议沟通
随机推荐
Based on infragistics Document. Excel export table class
February database ranking: how long can Oracle remain the first?
MySQL advanced (index, view, stored procedure, function, password modification)
Redis快速入门
Connect to LAN MySQL
mysql的列的数据类型详解
应用服务配置器(定时,数据库备份,文件备份,异地备份)
Interpretation of Flink source code (II): Interpretation of jobgraph source code
03 products and promotion developed by individuals - plan service configurator v3.0
JVM垃圾回收概述
C# WinForm系列-Button简单使用
ByteDance overseas technical team won the championship again: HD video coding has won the first place in 17 items
Flink 解析(七):时间窗口
How uipath determines that an object is null
MySQL basic addition, deletion, modification and query of SQL statements
【Elastic】Elastic缺少xpack无法创建模板 unknown setting index.lifecycle.name index.lifecycle.rollover_alias
Serial serialold parnew of JVM garbage collector
自动化运维利器-Ansible-Playbook
Development and practice of lightweight planning service tools
Jetpack compose 1.1 release, based on kotlin's Android UI Toolkit