Four suggestions for large data information security in China

Source: Internet
Author: User
Keywords Large data information security recommendations

As the "new Oil of the future", large data is becoming another hot spot in the field of information technology after cloud computing and Internet of things. However, the existing information security means can not meet the requirements of information security in the age of large data. While large data brings challenges to information security, it also provides new opportunities for the development of information security. The author believes that large data has become a significant target of cyber attacks, increased the risk of privacy disclosure, threats to existing storage and security measures, as the carrier of high-level sustainable attacks. On the one hand, large data technology has become a means to exploit the hacker's attack, on the other hand, it provides new support for information security. Therefore, in order to guarantee the security of large data information in our country, we must do the following work well.

One is to pay attention to the construction of large data and information security system. As a new concept, large data has not been put forward by our government directly to give policy support. In the "Twelve-Five" Planning of IoT, information processing technology is proposed as one of the 4 key technological innovation projects, including mass data storage, data mining, image and video intelligent analysis, which is an important part of large data. When planning for large data development, it is suggested that the propaganda of large data information security situation should be increased, the key protection object of large data be clarified, the monitoring of sensitive and vital data should be strengthened, the research on the information security technology for large data should be speeded up, the professional talents with large data security should be trained, and the large Data information security system

Second, speed up the development of large data security technology. The rapid development of new technologies such as cloud computing, IoT and mobile Internet has brought new security challenges to the collection, processing and application of large data. It is suggested to increase the capital investment of key technology research and development of large data security, improve the level of large data security technology in our country, promote the development of security technology based on large data, study the method of network attack tracking based on large data, and preempt the development of security technology based on large data.

Third, strengthen the supervision of sensitive data in key areas. The influx of massive data increases the likelihood that sensitive data will be exposed, and the disorderly use of large data adds to the risk of critical information leaks. At the government level, it is suggested that the scope of database of key areas should be defined, and the database management and safe operation system of key areas should be set up. At the enterprise level, it is recommended to strengthen the internal management of enterprises, make equipment, especially mobile equipment safety use procedures, standardize the use of large data and procedures.

Four is to use large data technology to deal with advanced sustainable attacks. Traditional security defenses are difficult to detect advanced persistent attacks. The security manufacturer should use large data technology to deal with the event pattern, attack mode, time and space characteristics, summarize and abstract some models to become large data security tools. In order to accurately describe the threat characteristics, the modeling process can take months or even years, and consumes a lot of human, material and financial resources. It is proposed to integrate large data processing resources, coordinate large data processing and analysis mechanisms, promote the sharing of information among key databases, accelerate the modeling process of advanced sustainable attacks, and eliminate and control the hazards of advanced sustainable attacks.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.