山东大学信息化工作办公室;青岛科技大学信息科技学院;
信息安全一直是各个国家以及各行各业极为重视的焦点问题之一。该文全面分析了大数据时代下的三大信息安全挑战。首先,探讨了如何应对大数据环境下的信息安全威胁,包括数据泄露和篡改问题,强调了国家政策和提升个人信息安全意识的重要性。其次,讨论了保障信息存储与数据传输安全性的策略,包括分布式存储和云存储的应用。最后,介绍了通过数据加密、数据脱敏、安全审计以及访问控制等手段提升信息安全设计与防护策略的必要性。面对这些挑战,强调社会各界提升对信息安全的警觉性和应对能力的必要性,不断深化对信息安全威胁的理解,并采取有效措施以增强整体的安全防护能力。
1,759 | 2 | 120 |
下载次数 | 被引频次 | 阅读次数 |
[1] WEISER M.The computer for the 21st century [J].ACM SIGMOBILE Mobile Computing and Communications Review,1999,3(3):3-11.
[2] SAGIROGLU S,SINANC D.Big data:a review[M].[s.l.]:[s.n.],2013:42-47.
[3] BOSE S,DEY S K,BHATTACHARJEE S.Big data,data analytics and artificial intelligence in accounting:an overview[M]//Handbook of big data research methods.[s.l.]:[s.n.],2023:32-51.
[4] CNCB-NGDC Members and Partners.Database resources of the national genomics data center,China national center for bioinformation in 2023[J].Nucleic Acids Research,2023,51(D1):D18-D28.
[5] GUO C ,CHEN J.Big data analytics in healthcare[M]//Knowledge technology and systems:toward establishing knowledge systems science.Singapore:Springer,2023:27-70.
[6] SIPONEN M T,OINAS-KUKKONEN H.A review of information security issues and respective research contributions[J].ACM SIGMIS Database:the DATABASE for Advances in Information Systems,2007,38(1):60-80.
[7] ASHENDEN D.Information security management:a human challenge[J].Information Security Technical Report,2008,13(4):195-201.
[8] FAN Jianqing,FANG Han,HAN Liu.Challenges of big data analysis[J].National Science Review,2014,1(2):293-314.
[9] PAL A,PAL S.Pattern recognition and big data[M].[s.l.]:World Scientific,2016:23-29.
[10] LANGLOIS P,PINTO A,HYLENDER D,et al.2023 data breach investigations report[R/OL].(2023-06-06)[2023-12-13].https://www.verizon.com/business/resources/reports/dbir/.
[11] 郑煦.互联网时代下基于国密算法的数据安全保护研究[C]//Proceedings of 2022 engineering technology innovation and management seminar.上海:上海筱虞文化传播有限公司,2022.
[12] SHARMA A.BlackCat (ALPHV) claims Swissport ransomware attack,leaks data[EB/OL].(2022-02-05)[2023-12-13].https://www.bleepingcomputer.com/news/security/blackcat-alphv-claims-swissport-ransomware-attack-leaks-data/.
[13] 王璇.面向数据篡改攻击的列控系统信息安全跨层防御方法[D].北京:北京交通大学,2022.
[14] 王世伟.论信息安全、网络安全、网络空间安全[J].中国图书馆学报,2015,41(2):72-84.
[15] 上海社会科学院信息研究所.信息安全辞典[M].上海:上海辞书出版社,2013:30-92.
[16] ZHANG X,XU F.Survey of research on big data storage[C]//第12届分布式计算及其应用国际学术研讨会.London:IEEE,2013:76-80.
[17] HOY M B.HTML5:a new standard for the Web[J].Medical Reference Services Quarterly,2011,30(1):50-55.
[18] FORD D,LABELLE F,POPOVICI F I,et al.Availability in globally distributed storage systems[C]//9th USENIX symposium on operating systems design and implementation.Vancouver:Remzi Arpaci-Dusseau,2010:1-7.
[19] LAZENBY D.Book review:managing afs:Andrew file system[J].Linux Journal,1998,4(5):13-14.
[20] SHVACHKO K,KUANG H,RADIA S.The hadoop distributed file system[C]//2010 IEEE 26th symposium on mass storage systems and technologies (MSST).Incline Village:IEEE,2010:1-10.
[21] PALANKAR M R,IAMNITCHI A,RIPEANU M.Amazon S3 for science grids:a viable solution[C]//Proceedings of the 2008 international workshop on Data-aware distributed computing.Boston:Tevfik Kosar,2008:55-64.
[22] SHAH S M,KHAN R A.Secondary use of electronic health record:opportunities and challenges[J].IEEE Access,2020,8:136947-136965.
[23] ABIE H.An overview of firewall technologies[J].Telektronikk,2000,96(3):47-52.
[24] DANKAR F K,EL EMAM K.Practicing differential privacy in health care:a review[J].Trans.Data Priv.,2013,6(1):35-67.
[25] 王骏翔.数据加密技术在计算机网络信息安全中的应用[J].数字通信世界,2023(7):141-143.
[26] 江茜.大数据安全审计框架及关键技术研究[J].信息安全研究,2019,5(5):400-405.
基本信息:
DOI:10.20165/j.cnki.ISSN1673-629X.2024.0152
中图分类号:TP309;TP311.13
引用信息:
[1]林飞,刘佳宁,焦强.大数据背景下信息安全问题探析[J].计算机技术与发展,2024,34(08):1-8.DOI:10.20165/j.cnki.ISSN1673-629X.2024.0152.
基金信息: