[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ke et al., 2023 - Google Patents

Construction of enterprise network information security technology system under the background of big data

Ke et al., 2023

View PDF
Document ID
6834439909003435084
Author
Ke L
et al.
Publication year
Publication venue
Information Systems and Economics

External Links

Snippet

This paper aims to explore the construction of enterprise network information security technology system under the background of big data. With the advent of the era of big data, enterprises are facing the growing threat of network information security. In order to deal with …
Continue reading at www.clausiuspress.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices

Similar Documents

Publication Publication Date Title
Mughal The Art of Cybersecurity: Defense in Depth Strategy for Robust Protection
Priyadarshini Introduction on cybersecurity
Martin et al. Nasa cybersecurity: An examination of the agency’s information security
Peng Research on the Technology of Computer Network Security Protection
Ozer et al. Cloud incident response: Challenges and opportunities
Ke Construction of enterprise network information security technology system under the background of big data
Burrell Cybersecurity in Healthcare Through the 7-S Model Strategy
Wang et al. Challenges and solutions for network security in the information age
Mahmudov Cyber Warfare: understanding the elements, effects, and future trends of cyber-attacks and defences
Sitorabonu et al. THE ROLE OF NEW TECHNOLOGIES IN PROVIDING INFORMATION SECURITY IN CAPARATIVE NETWORKS
Khan et al. Work-from-home Security Issues and Risks over Internet
Kommera Adaptive Cybersecurity in the Digital Age: Emerging Threat Vectors and Next-Generation Defense Strategies
Teymourlouei et al. Effectiveness of real-time network monitoring for identifying hidden vulnerabilities inside a system
Vemula et al. Mitigating Insider Threats through Behavioural Analytics and Cybersecurity Policies
Selvam et al. Enhancing Utility Sector Efficiency and Security: Integrating Digital Identity Systems Amidst Privacy and Ransomware Challenges
Seenivasan Critical Security Enhancements for ETL Workflows: Addressing Emerging Threats and Ensuring Data Integrity
More et al. Study of Current Scenario of Cyber Security Practices and Measures: Literature Review
Zhang et al. Research on the Application of Network Security Technologies in the Network Security Operations and Maintenance Process
Zavrazhnyi et al. Modern business cybersecurity challenges and the role of artificial intelligence in countering threats
Gamilla et al. Building A Barrier: A Security Operations Center Framework For A Sustainable Smart Campus Network
Cappelli et al. The Key to Successful Monitoring for Detection of Insider Attacks
Fauzi et al. The Importance of Implementing Security Management in the Era of Digital Transformation
Lavrut et al. Cyber Defense Is A Modern Component Of Ukraine's Security.
Zhang Analysing Computer System Security and Computer Network Security
Shan Design and Implementation of Computer Information Security Management System in Colleges and Universities