当前位置:网站首页>Interpretation and download of the report | ink Tianlun July database industry report, be prepared for danger in times of safety, and safety first
Interpretation and download of the report | ink Tianlun July database industry report, be prepared for danger in times of safety, and safety first
2022-07-25 04:25:00 【Data and cloud】
The editor : This series analyzes industry trends , Focus on “ Data and cloud ( OraNews )” reply : download . You can find the document link .
In recent days, , Motianlun community released 《2022 year 7 China's database industry analysis report - In time of peace prepare for war , Safety first 》, The report analyzes the development of China's database market . The following is an excerpt from the report for sharing .
Recently, domestic data security accidents have occurred frequently , Review the past , I was there 《 Data security alert 》 The book describes a large number of cases related to data security , Expect to arouse the industry's warning and vigilance . This is the theme and goal of this issue .
The first edition of the book has been opened for download in Mo Tianlun :https://www.modb.pro/doc/110
Mo Tianlun ranking 7 Monthly ranking ,TiDB、 Reach a dream 、openGauss In the top three , Among them, Dameng is about to IPO It has aroused heated discussion in the industry , Its hot spots have increased significantly , Beyond openGauss second ,TiDB 7 Monthly points increase 22 branch , Number one :
Da Mengyu 6 month 29 It's going to be , It will be listed on the science and Technology Innovation Board , Plan to raise money 23.51 One hundred million yuan , After listing, it will become the first share of domestic database . Dream in 2021 The annual operating revenue reached 7.43 One hundred million yuan , Net income of 4.3 One hundred million yuan . Adhere to database research and development 20 year , Finally, it will be abundant .
There are laws to follow in the field of data security ,2021 year 9 month 1 Japan ,《 Data security law of the people's Republic of China 》 In force . Determine the principle of data classification and management , It standardizes the obligations that enterprises should perform when carrying out data processing activities .
Take the financial industry as an example , Three stages of data classification Namely , Business segmentation 、 Data classification 、 Data grading . Grading objective : Complete the data level determination on the basis of classification ; And describe the specific form of the data , Determine the system 、 Storage media 、 Physical position, etc. .
Enterprise data security can be combed based on five dimensions , Accordingly, corresponding safety protection measures are established . Among these five safety directions , There may be two kinds of security problems :
- First of all , because Data security problems caused by poor internal management ;
- second , Security problems caused by external malicious attacks .
Usually, we narrow the security issue to the latter , This is actually one-sided , On the issue of data security , Data loss caused by the former 、 Data corruption , Its incidence and impact are far more than the latter .
Important data security accidents in recent years , Most of them come from open source databases . Open source database 2 The big problem is fundamental :
1. It has safety defects , Not as mature as commercial databases ;
2. Users don't know much about open source databases , There are blind spots in safety .
The two are combined , Make open source database software security problems occur frequently .
Business database , It often contains rich security capabilities , With Oracle Database, for example ,45 The construction in has enabled it to have corresponding protection capabilities in all aspects :
stay openGauss and MogDB in , Innovative features Fully dense database It is the best protection for safety at present , By storing 、 transmission 、 Calculate three-layer encryption , Make data security get all-round protection , Even if the data file is stolen , Also cannot obtain readable data information :
To sum up your experience , Follow the principles , I summarized in the past DevOps Of 36 Ji et al , It can help you understand the difficulties we encountered in practice in the past .
Looking forward to the future , Forward looking directions in the field of data security include , Fully dense data processing 、 Data security multiparty Computing 、 Tamper proof data processing 、 Data privacy Computing .
Previous reports are free to download :
Daily learning , For reference only .
Yunhe enmo lecture hall | A place to share and communicate
Long press , Identify QR code , Join in ten thousand people Communication community
Please note : Yunhe enmo lecture hall
Order one “ Looking at ”
Your love will be seen
边栏推荐
- Do you really understand images? (machine vision)
- Introduction to computing system hardware (common servers)
- GetData table table data join MySQL method
- JS absolute minimum value of the sum of Huawei od two numbers
- Xrrunner, a domestic performance testing tool for palm smart, officially unveiled qecon
- If the development of the metauniverse still follows the development logic of the Internet, and its end point also follows
- Optimize bubble sorting
- [daily question] 731. My schedule II
- Installation and tutorial of MATLAB curling simulation game
- 13. Talk about the expiration strategy of redis
猜你喜欢

Internship in 2022

Simple understanding of RPC

Detailed explanation of kubernetes network plug-in - flannel chapter

CVPR 2022 | content aware text logo image generation method

01 create project warehouse

Chapter 3 business function development (modify the remarks of market activities)

Maker concept design to adapt to popular education

ECCV 2022 | rethinking image blending for data enhancement in vision transformers

Deeply understand the connection state and reliable mechanism of TCP protocol

Xrrunner, a domestic performance testing tool for palm smart, officially unveiled qecon
随机推荐
Debezium series: Show slave status view the possible different situations of master-slave delay
[laser principle and application -5]: laser diode LD (laser diode) and laser diode driver (LD driver)
Creativity: presentation of AI oil paintings with high imitation mineral pigments
Day008 select structure (switch statement)
01 create project warehouse
Max matrix and JS
Student thinking vs workplace thinking
PCBA scheme design -- Bluetooth intelligent nutrition scale scheme
SQL comment
What causes the wait event of TCP socket (kgas) in oracle?
[golang from introduction to practice] poker licensing game
High temperature in Britain: two airport runways were burnt out, and several railways were restricted to ensure safety
If the development of the metauniverse still follows the development logic of the Internet, and its end point also follows
CVPR 2022 | content aware text logo image generation method
Implementing DDD based on ABP -- domain logic and application logic
When the development of the meta universe begins to show more and more the style of the Internet, we need to be vigilant
EMQ Yingyun technology was successfully selected into the 2022 "cutting edge 100" list of Chinese entrepreneurs
Optimize bubble sorting
Infinite connection · infinite collaboration | the first global enterprise communication cloud conference WECC is coming
Pandora IOT development board learning (RT thread) - Experiment 16 WiFi module experiment (learning notes)