当前位置:网站首页>Data Middle Office Construction (10): Data Security Management
Data Middle Office Construction (10): Data Security Management
2022-08-05 10:15:00 【InfoQ】
Data Security Management

The data security management mentioned in the Data Center focuses on the data security management within the enterprise, which is a narrow sense of data security management, and focuses on the security management technical means of the big data platform.
In the era of big data, the entire life cycle of data includes: data generation, data storage, data transmission, data use, data sharing, and data destruction.All people have different data security risks.In the data center, data security can be achieved with the help of some technical means.
1. Unified security authentication and authority management
There are many security management technologies in big data, such as: Kerberos, Ranger, Hive, ClickHouse also have their ownWe can use these technologies to achieve data security management in data collection, data development, and data system.
2. Data resource isolation
For the use of data by business parties, we can also implement the data authorization platform ourselves to decide which departments and who have the right to access sensitive data.Permissioned data resources are isolated.
3. Data encryption
When data is transmitted between networks, data encryption can be considered. Data encryption is to use a special algorithm to change the original information dataMake it unreadable or meaningless, so that unauthorized users can obtain encrypted information, and still cannot understand the content of the information because they do not know the method of decryption.
4. Data desensitization
In order to prevent the leakage of user privacy data, business secrets and other information during data transmission, sharing and display, big data primary keys orThe self-built platform desensitizes the data.
边栏推荐
- 无题六
- What is CRM Decision Analysis Management?
- 力扣(LeetCode)216. 组合总和 III(2022.08.04)
- The founder of the DFINITY Foundation talks about the ups and downs of the bear market, and where should DeFi projects go?
- Offensive World-PWN-new_easypwn
- IO stream articles -- based on io stream to realize folder copy (copy subfolders and files in subfolders) full of dry goods
- The century-old Nordic luxury home appliance brand ASKO smart wine cabinet in the three-temperature area presents the Chinese Valentine’s Day, and tastes the love of the delicacy
- 百年北欧奢华家电品牌ASKO智能三温区酒柜臻献七夕,共品珍馐爱意
- Still looking for a network backup resources?Hurry up to collect the following network backup resource search artifact it is worth collecting!
- uniapp connect ibeacon
猜你喜欢
随机推荐
高质量 DeFi 应用构建指南,助力开发者玩转 DeFi Summer
dotnet OpenXML 解析 PPT 图表 面积图入门
第四章:redis 数组结构的set和一些通用命令「建议收藏」
开发常用手册链接分享
正则表达式replaceFirst()方法具有什么功能呢?
What is the function of the regular expression replaceAll() method?
我们的Web3创业项目,黄了
第八章:activiti多用户任务分配
无题五
STM32+ULN2003驱动28BYJ4步进电机(根据圈数正转、反转)
无题十一
Egg framework usage (2)
Tanabata romantic date without overtime, RPA robot helps you get the job done
MySQL之数据视图
告白数字化转型时代:麦聪软件以最简单的方式让企业把数据用起来
歌词整理
three物体围绕一周呈球形排列
How can project cost control help project success?
STM32+ULN2003 drives 28BYJ4 stepper motor (forward and reverse according to the number of turns)
百年北欧奢华家电品牌ASKO智能三温区酒柜臻献七夕,共品珍馐爱意








