当前位置:网站首页>Xin'an Second Edition: Chapter 26 big data security demand analysis and security protection engineering learning notes

Xin'an Second Edition: Chapter 26 big data security demand analysis and security protection engineering learning notes

2022-07-06 17:34:00 Moon Dream Studio

One 、 The outline of this chapter requires

9. Big data security demand analysis and security protection engineering

9.1 Big data security threat and demand analysis

9.1.1 Big data security threat analysis

◆ Concept and characteristics of big data ◆ Big data security

9.1.2 Big data security requirements analysis

◆ Basic requirements for data security ( The authenticity of the data 、 The real time 、 Confidentiality 、 integrity 、 Usability 、 traceability )

◆ Big data security compliance

◆ Big data cross-border security

◆ Big data privacy protection

◆ Big data processing platform security

◆ Big data business security

◆ Secure operation of big data

9.2 Big data security protection mechanism and technical scheme

9.2.1 Big data self security protection technology

◆ Data source authentication ◆ Data traceability ◆ Data user identification and identification ◆ Data resource access control

9.2.2 Big data platform security protection technology

◆ Big data platform border security

◆ Big data network communication security

◆ Identity authentication and authority management of big data users

◆ Big data computing security

◆ Big data platform emergency disaster recovery

◆ Big data audit and monitoring

9.2.3 Big data service security protection technology

◆ Business authorization ◆ Business logic security ◆ Sensitive data security check

9.2.4 Big data privacy security protection technology

◆ Data identity anonymity ◆ Data differential privacy ◆ Data desensitization ◆ Data encryption ◆ Data access control

9.2.5 Big data operation security protection technology

◆ Security maintenance of big data processing system

◆ Big data processing system security policy update

◆ Big data processing system security equipment configuration

◆ Big data processing system security event monitoring and emergency response

◆ Big data processing system intrusion detection and network security situational awareness

◆ Big data processing system network attack forensics

◆ Big data processing system security audit 、 Safety fortress machine

◆ Disaster recovery backup of big data processing system

9.2.6 Big data security management and Standards

◆ Big data security level protection and understanding of relevant standards and specifications

<
原网站

版权声明
本文为[Moon Dream Studio]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/02/202202131310453049.html