How to ensure the security of big data
Currently, China urgently needs to rely on the "Outline of Action on Promoting the Development of Big Data", comprehensively adopt a variety of tools such as strategy, policy, law, etc., to build up a system of security protection for big data, including legal, administrative, technological, industry and society, to intensify the security protection of big data, and to create a healthy and environmentally friendly eco-operation system for big data.
One is to strengthen the research and development and popularization and application of basic protection technology. We will promote the popularization and application of general protection technologies for business systems to prevent attacks and intrusions, and introduce and promote mature special technologies for big data security protection, such as anonymization technology and data leakage protection model technology.
The second is to strengthen the construction and implementation of the basic protection technology system. It formulates and organizes the implementation of industry standards, enterprise standards and alliance specification guidelines applicable to big data security protection, and specifies the scope of protection, type of protection, level of protection, specific technical protection requirements and management requirements for big data security protection.
Third, we will effectively strengthen the security protection of key information infrastructure. Do a good job of big data platforms and service providers, reliability and security assessment, application security assessment, monitoring and early warning and risk assessment; clear data collection, transmission, storage, use, open and other aspects of network security to protect the scope of the boundaries of the main body of the responsibility and specific requirements, and effectively strengthen the protection of information related to national interests, public **** security, commercial secrets, personal privacy, military scientific research and production.
Fourth, to carry out risk assessment and security certification activities of big data security flow. Establishment of a big data security assessment system, the implementation of information security level protection, risk assessment and other network security systems; development and release of industry norms and guidelines for big data security protection, the organization of the signing of industry self-regulatory conventions for big data security protection, carry out risk assessment of the status of data security protection for big data trading platforms and security certification activities, based on risk assessment and security certification results issued by the big data security protection Based on the results of risk assessment and security certification, it will release a comprehensive ranking of big data security protection, and urge industry enterprises to do a good job of self-restraint in big data security protection.
Fifth, the use of safe and trustworthy products and services to enhance the safety and reliability of key infrastructure equipment. The construction of the national network security information convergence ****sharing and correlation analysis platform, promote the fusion of network security-related data and the rational allocation of resources, enhance the emergency response capability of major network security incidents; deepen the network security protection system and situational awareness capacity building, enhance the cyberspace security protection and the ability to identify security events.
The above is what I shared with you about how to ensure the security of big data, more information can be concerned about the Global Green Ivy to share more dry goods