当前位置:网站首页>Xin'an Second Edition: Chapter 26 big data security demand analysis and security protection engineering learning notes
Xin'an Second Edition: Chapter 26 big data security demand analysis and security protection engineering learning notes
2022-07-06 17:34:00 【Moon Dream Studio】
One 、 The outline of this chapter requires
9. Big data security demand analysis and security protection engineering
9.1 Big data security threat and demand analysis
9.1.1 Big data security threat analysis
◆ Concept and characteristics of big data ◆ Big data security
9.1.2 Big data security requirements analysis
◆ Basic requirements for data security ( The authenticity of the data 、 The real time 、 Confidentiality 、 integrity 、 Usability 、 traceability )
◆ Big data security compliance
◆ Big data cross-border security
◆ Big data privacy protection
◆ Big data processing platform security
◆ Big data business security
◆ Secure operation of big data
9.2 Big data security protection mechanism and technical scheme
9.2.1 Big data self security protection technology
◆ Data source authentication ◆ Data traceability ◆ Data user identification and identification ◆ Data resource access control
9.2.2 Big data platform security protection technology
◆ Big data platform border security
◆ Big data network communication security
◆ Identity authentication and authority management of big data users
◆ Big data computing security
◆ Big data platform emergency disaster recovery
◆ Big data audit and monitoring
9.2.3 Big data service security protection technology
◆ Business authorization ◆ Business logic security ◆ Sensitive data security check
9.2.4 Big data privacy security protection technology
◆ Data identity anonymity ◆ Data differential privacy ◆ Data desensitization ◆ Data encryption ◆ Data access control
9.2.5 Big data operation security protection technology
◆ Security maintenance of big data processing system
◆ Big data processing system security policy update
◆ Big data processing system security equipment configuration
◆ Big data processing system security event monitoring and emergency response
◆ Big data processing system intrusion detection and network security situational awareness
◆ Big data processing system network attack forensics
◆ Big data processing system security audit 、 Safety fortress machine
◆ Disaster recovery backup of big data processing system
9.2.6 Big data security management and Standards
◆ Big data security level protection and understanding of relevant standards and specifications
<边栏推荐
- Junit单元测试
- Akamai anti confusion
- connection reset by peer
- 【ASM】字节码操作 ClassWriter 类介绍与使用
- Vscode matches and replaces the brackets
- 关于Selenium启动Chrome浏览器闪退问题
- Huawei certified cloud computing hica
- [VNCTF 2022]ezmath wp
- Some feelings of brushing leetcode 300+ questions
- Precipitated database operation class - version C (SQL Server)
猜你喜欢
The problem of "syntax error" when uipath executes insert statement is solved
C version selenium operation chrome full screen mode display (F11)
Flink 解析(三):内存管理
PySpark算子处理空间数据全解析(5): 如何在PySpark里面使用空间运算接口
JVM 垃圾回收器之Garbage First
Interpretation of Flink source code (III): Interpretation of executiongraph source code
07 personal R & D products and promotion - human resources information management system
华为认证云计算HICA
Final review of information and network security (full version)
Introduction to spring trick of ByteDance: senior students, senior students, senior students, and the author "brocade bag"
随机推荐
How does wechat prevent withdrawal come true?
05 personal R & D products and promotion - data synchronization tool
【逆向初级】独树一帜
JVM 垃圾回收器之Garbage First
Flexible report v1.0 (simple version)
Some feelings of brushing leetcode 300+ questions
C WinForm series button easy to use
CTF逆向入门题——掷骰子
Akamai 反混淆篇
JVM garbage collector part 1
Interpretation of Flink source code (II): Interpretation of jobgraph source code
Vscode matches and replaces the brackets
Flink 解析(七):时间窗口
网络分层概念及基本知识
Error: Publish of Process project to Orchestrator failed. The operation has timed out.
EasyRE WriteUp
Flink analysis (II): analysis of backpressure mechanism
Only learning C can live up to expectations top3 demo exercise
PySpark算子处理空间数据全解析(5): 如何在PySpark里面使用空间运算接口
SQL调优小记