Abstract

Nowadays, with the continuous advancement of globalization, Internet technology has made an unprecedented leap, which makes the amount of data on the Internet grow exponentially. Data are not only diverse and numerous, but also spread fast and of high value. Therefore, the Internet is entering the era of big data. However, the openness of information network itself, the immaturity of technology, and the imperfection of network security law make it vulnerable to network attacks, resulting in the disclosure of network users' information and the theft of their privacy data. The formulation of network information security law to protect network information security is of great significance for the development of multidomain network information security under the background of big data and ensuring users' online security. Firstly, this article introduces the basic information of embedded real-time task system, analyzes the factors of real-time Linux based on kernel preemption, interrupts mechanism and policy planning, and summarizes the process of some embedded real-time task processing. Integrating legal management, this article puts forward three elements of network security control mechanism, namely, network control personnel, environment, and technology. Taking these three elements as the starting point of the construction of information security control mechanism, this article provides the steps of using evaluation model to evaluate network information security. Finally, it identifies the problems existing in the legal management of network information security and formulates the corresponding strategies. By combining embedded technology and real-time task processing technology, this study applies it to the field of network information security legal management, to promote its development.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.