Font Size: a A A

Research On The Enterprise Information Security Evaluation And Countermeasures Under The Background Of Big Data

Posted on:2016-09-04Degree:MasterType:Thesis
Country:ChinaCandidate:M M TangFull Text:PDF
GTID:2308330461980569Subject:Business administration
Abstract/Summary:PDF Full Text Request
Processing and analysis big data is becoming a core support node of the next generation of IT integration applications. Internet of things,mobile Internet, digital home, social networks are specific IT application form in this new generation. Along with that, large data applications is growing, the mass of the cloud is providing storage and computing support platform for a variety of big data. The world is rapidly embracing the "big data", while the "big data security" issue has become known industry term inevitably, a variety of information security conferences and forums about exploring are all talking about big data security. At the same time of big data technology brings opportunities, it brings more security problems. As new information bonanza, big data can become the focus of the object of attack by hackers easily and a lot of threats about data security cases are endless.This paper introduces the background and significance of research ideas and methods. On the basis of exploring the concept, the characteristics opportunities, trends of big data and introducing corporate information security requirements hierarchy, the challenges of the enterprise information security management as for big data was analyzed. Furthermore, under the premise of introducing the enterprise information risk sources under background of large data, the principle of enterprise information security evaluation index system construction under the background of big data was presented, and an evaluation system advice was built. In order to accurately evaluate the enterprise information security, selecting the appropriate evaluation methods is important. Then after introducing safety assessment methods commonly used, NH company information security was evaluated. Finally, from the perspective of both the general and departments, enterprise information security management strategy was elaborated. In the concluding section of this paper, the innovative and limitations of the study were analyzed, and the enterprise information security management research under the background of big data was prospected.
Keywords/Search Tags:Big data, Information security, Enterprise information security, Safety evaluation
PDF Full Text Request
Related items