Abstract
It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the relationship between the security service and security mechanism in the network information security architecture. On this basis, a network information security system model is proposed, which is composed of three parts, namely, the core layer, the logic layer and the implementation layer. Finally, this paper points out that the network information security protection technology is important, but it is still indispensable that management is in place.
Highlights
Xi Jinping, the chairman of China who personally served as the central network security and information technology leadership team leader, has aired his views and opinions about the development of the internet, and promoted the network to the national development and security level
Network security and information technology affect the country’s security and stability, and the concept “Internet +” which is put forward shows the determination of China to transform the network big into the network power
There is no uniform understanding toward the definition of Big Data [1], which is defined by Research organization Gartner as: The information assets need new processing mode to have the greater decision-making power, insight discovery and process optimization of massive, high growth rate and diversification
Summary
Xi Jinping, the chairman of China who personally served as the central network security and information technology leadership team leader, has aired his views and opinions about the development of the internet, and promoted the network to the national development and security level. We must have our own core technology to build network power and the construction of information security management system in the era of big data. The definition of big data is defined by Wikipedia as: A collection of data can’t be captured, managed, and processed with conventional software tools in the affordable time range. Security is defined as: “To avoid the nature or condition of danger” [1]. To maintain this nature or state, a variety of security policies are reķ< Decision of the CPC Central Committee on major issues concerning comprehensively promoting the rule of law >.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have