Font Size: a A A

Research On Technology Information Security Risk Analysis And Evaluation Of Enterprises In Big Data Environment

Posted on:2020-12-29Degree:MasterType:Thesis
Country:ChinaCandidate:L C ZhengFull Text:PDF
GTID:2480306518462044Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of big data technology,the data value of big data has been highly valued by governments,and various big data platforms have emerged.The dependence of big data on enterprises is also increasing.At the same time,the big data environment has made the risks faced by enterprises' technology security work increasingly increasing,and the management difficulty has been continuously improved.The traditional technology security risk analysis and evaluation methods have been difficult to meet the security security requirements of the big data environment.To this end,the research and practice of scientific and confidentiality risk analysis and evaluation theory in the big data environment is very urgent for modern enterprises.This paper focuses on the research and analysis of enterprise technology security risk analysis and evaluation under the big data environment.First,through the comparative analysis of the big data environment and the traditional environment,the characteristics of enterprise technology security risks in the big data environment are obtained and identified.Then,with reference to the big data life cycle model,the technology security risk assessment index system in the big data environment is constructed.Finally,this paper explores and studies the enterprise technology security risk analysis and evaluation model adapted to the big data environment,and compares the different evaluation models to a large state-owned enterprise.The numerical results of the examples are used to analyze the performance differences and applicability of different evaluation models,and the conclusions of the full-text research are obtained.
Keywords/Search Tags:Big data, Technology information security, Risk analysis and assessment, Life cycle model, Analytic hierarchy process, Fuzzy comprehensive evaluation, Multi-layer perceptual neural network
PDF Full Text Request
Related items