Ke et al., 2023 - Google Patents
Construction of enterprise network information security technology system under the background of big dataKe et al., 2023
View PDF- Document ID
- 6834439909003435084
- Author
- Ke L
- et al.
- Publication year
- Publication venue
- Information Systems and Economics
External Links
Snippet
This paper aims to explore the construction of enterprise network information security technology system under the background of big data. With the advent of the era of big data, enterprises are facing the growing threat of network information security. In order to deal with …
- 238000005516 engineering process 0 title abstract description 55
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mughal | The Art of Cybersecurity: Defense in Depth Strategy for Robust Protection | |
Priyadarshini | Introduction on cybersecurity | |
Martin et al. | Nasa cybersecurity: An examination of the agency’s information security | |
Peng | Research on the Technology of Computer Network Security Protection | |
Ozer et al. | Cloud incident response: Challenges and opportunities | |
Ke | Construction of enterprise network information security technology system under the background of big data | |
Burrell | Cybersecurity in Healthcare Through the 7-S Model Strategy | |
Wang et al. | Challenges and solutions for network security in the information age | |
Mahmudov | Cyber Warfare: understanding the elements, effects, and future trends of cyber-attacks and defences | |
Sitorabonu et al. | THE ROLE OF NEW TECHNOLOGIES IN PROVIDING INFORMATION SECURITY IN CAPARATIVE NETWORKS | |
Khan et al. | Work-from-home Security Issues and Risks over Internet | |
Kommera | Adaptive Cybersecurity in the Digital Age: Emerging Threat Vectors and Next-Generation Defense Strategies | |
Teymourlouei et al. | Effectiveness of real-time network monitoring for identifying hidden vulnerabilities inside a system | |
Vemula et al. | Mitigating Insider Threats through Behavioural Analytics and Cybersecurity Policies | |
Selvam et al. | Enhancing Utility Sector Efficiency and Security: Integrating Digital Identity Systems Amidst Privacy and Ransomware Challenges | |
Seenivasan | Critical Security Enhancements for ETL Workflows: Addressing Emerging Threats and Ensuring Data Integrity | |
More et al. | Study of Current Scenario of Cyber Security Practices and Measures: Literature Review | |
Zhang et al. | Research on the Application of Network Security Technologies in the Network Security Operations and Maintenance Process | |
Zavrazhnyi et al. | Modern business cybersecurity challenges and the role of artificial intelligence in countering threats | |
Gamilla et al. | Building A Barrier: A Security Operations Center Framework For A Sustainable Smart Campus Network | |
Cappelli et al. | The Key to Successful Monitoring for Detection of Insider Attacks | |
Fauzi et al. | The Importance of Implementing Security Management in the Era of Digital Transformation | |
Lavrut et al. | Cyber Defense Is A Modern Component Of Ukraine's Security. | |
Zhang | Analysing Computer System Security and Computer Network Security | |
Shan | Design and Implementation of Computer Information Security Management System in Colleges and Universities |