期刊文献+

浅谈企业数据安全风险分析及保护 被引量:2

Discussion on Enterprise Data Security Risk Analysis and Protection
在线阅读 下载PDF
导出
摘要 随着互联网、物联网、云计算等技术的快速发展,数据价值在云计算大数据时代,已经远远超过数据本身。一方面,云计算海量的、多样化的数据提供存储和运算平台,使数据挖掘和人工智能从大数据中发现知识、规律和趋势,为决策提供信息参考;另一方面,基于云计算的大数据,给各行各业带来全新智能,释放出无限价值。阿里云在杭州召开的云栖大会中,将云计算和大数据的关联总括为"计算无法计算的价值"正是体现了当下发展趋势已由IT时代向DT时代转变。DT时代,数据对于企业而言,是企业核心资源,能够为企业开拓市场、提供业务创新的决策分析能力,保障企业核心竞争力及价值。然而近年来出现的各种数据泄露大事件,对企业造成了严重的负面影响。因此,如何保护数据安全已经成为企业信息安全建设中的重中之重。 With the rapid development of Internet, Internet of things and cloud computing technology, the value of data has far exceeded the data itself in the era of cloud computing and big data. On the one hand, the diversification of the data storage and computing platform for cloud computing, massive data mining, artificial intelligence and knowledge discovery, patterns and trends from big data, providing reference information for decision making; on the other hand, big data Based on cloud computing, to all walks of life to bring a new intelligent release, infinite value. Ali cloud held in Hangzhou cloud conference, cloud computing and big data association summed up as "calculation can not be calculated value", it reflects the current trend of development has changed from the IT era to the DT era. In the era of DT, data is the core resource of an enterprise. It can open up the market for enterprises, provide the decision analysis ability of business innovation, and guarantee the core competitive power and value of enterprises. However, in recent years, a variety of data leakage incidents have caused serious negative impact on enterprises. Therefore, how to protect data security has become the most important thing in enterprise information security construction.
作者 钟全德
出处 《电脑知识与技术(过刊)》 2017年第11X期58-60,73,共4页 Computer Knowledge and Technology
关键词 数据保护 敏感数据 数据安全 数据加密 DLP data protection sensitive data data security data encryption DLP
  • 相关文献

参考文献5

二级参考文献15

  • 1高峰,许南山.防火墙包过滤规则问题的研究[J].计算机应用,2003,23(z1):311-312. 被引量:14
  • 2陈雷,张志刚,肖文曙,张玉军.IPv6防火墙的设计与实现[J].微计算机信息,2005,21(07X):63-65. 被引量:8
  • 3Al-shaer E, Hamed H. Design and Implementation of Firewall Policy Advisor Tools. Technical Report CTI-techrep0801, School of Computer Science Telecommunications and Information Systems,Depaul University, 2002-08.
  • 4Cheswick W, Belovin S. Firevalls and Internet Security. AddisonWesley, 1995.
  • 5Chapman D, Zwicky E. Building Internet Firewalls (Second Edition).Oriellv & Associates Inc.. 2000.
  • 6Hare C、Siyan K著,刘成勇译.Internet防火墙与网络安全[M].北京:机械工学出版社,1998
  • 7RobertZiegler.Linux防火墙.余青霞,周钢译.北京:人民邮电出版社,2000.10
  • 8David Pitts,BillBall.RedHatLinux6大全[M].北京:机械工业出版社.2000.
  • 9Gouda M,Liu X.Firewall Design:Consistency,Completeness,and Compactness[C]//Proceedings of the 24^th IEEE International Conference on Distributed.2004-03.
  • 10Al-Shaer E,Hamed H.Design and Implementation of Firewall Policy Advisor Tools[R].School of Computer Science Telecommunications and Information Systems,DePaul University,CTI-techrep:0801,2002-08.

共引文献45

同被引文献10

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部