z-logo
open-access-imgOpen Access
Network Security Protection Technology under the Background of Computing Big Data
Author(s) -
Shanjie Chen
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1982/1/012207
Subject(s) - security information and event management , security service , cloud computing security , computer security , computer science , network security policy , backup , computer security model , network access control , security convergence , enterprise information security architecture , security through obscurity , information security management , network security , security testing , information security , database , cloud computing , operating system
Based on the risk analysis of the network security of the radio and television critical information infrastructure, this paper introduces the evolution process of the network security protection architecture, and proposes the network security intelligent protection architecture. The article starts from the protection content and methods of physical security, network security, border security, server security, terminal security, application security, data security and backup and recovery, security management center and other technical aspects. Construction is explored. The thesis builds a reliable and stable broadcast technology center network information security system through the establishment of a network information security technology guarantee and a network information security management system.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here