|本期目录/Table of Contents|

[1]牟明福,苏正泉.大数据发展的信息安全风险防御探析[J].中国安全生产科学技术,2017,13(9):66-71.[doi:10.11731/j.issn.1673-193x.2017.09.010]
 MU Mingfu,SU Zhengquan.Analysis on the risk of the development of big data from thperspective of information security[J].JOURNAL OF SAFETY SCIENCE AND TECHNOLOGY,2017,13(9):66-71.[doi:10.11731/j.issn.1673-193x.2017.09.010]
点击复制

大数据发展的信息安全风险防御探析
分享到:

《中国安全生产科学技术》[ISSN:1673-193X/CN:11-5335/TB]

卷:
13
期数:
2017年9期
页码:
66-71
栏目:
现代职业安全卫生管理与技术
出版日期:
2017-09-30

文章信息/Info

Title:
Analysis on the risk of the development of big data from thperspective of information security
文章编号:
1673-193X(2017)-09-0066-06
作者:
牟明福1苏正泉2
(1.中共贵州省委党校,贵州 贵阳 550028;2.国家行政学院,北京 100089)
Author(s):
MU Mingfu1SU Zhengquan2
(1.CPC Guizhou provincial Party School, Guiyang Guizhou 550028,China; 2.National School of Administration,Beijing 100089,China)
关键词:
大数据信息安全风险防御
Keywords:
Big datainformation securityrisk defense
分类号:
X913.4
DOI:
10.11731/j.issn.1673-193x.2017.09.010
文献标志码:
A
摘要:
大数据的发展及广泛应用加大了信息化系统及数据的脆弱性,信息安全风险向系统化、复杂化方向发展。在搜集、整理国内外相关研究成果基础上,系统辨识数据采集、数据传输、数据存储、数据分析4个大数据核心环节的信息安全风险,围绕“风险辨识、脆弱性降低、风险沟通、强化风险管理”的风险治理流程,以防范与化解信息安全风险为目标,提出大数据发展的信息安全防御策略。研究结果表明:大数据全生命周期是信息安全风险辨识的起点,强化大数据发展的信息安全风险防御,需要在风险辨识基础上,积极推进预防准备、风险沟通、信息安全事件处置及恢复总结。
Abstract:
The development and extensive application of big data have increased the vulnerability of information systems and data, and the risk of information security has developed towards the systematic and complex direction. In collecting and sortin out the domestic and foreign related research literature on the basis of system identification, data acquisition, data transmission, data storage and information security risk analysis of four core data link, focus on risk identification, risk reduction, fragile process management, strengthen risk communication risk management, information security and defense strategy to prevent and resolve information security risks are put forward for the purpose of the development of big data. The results show that the data lifecycle is the starting point of the information security risk identification, information security risk defense strengthen the development of big data, based on risk identification, risk prevention, to actively promote the communication of information security incidents, disposal and recovery summary.

参考文献/References:

[1]陈明奇,姜禾,张娟,等.大数据时代的美国信息网络安全新战略分析[J].信息网络安全,2012(8):32-35. CHEN Mingqi,JIANG He,ZHANG Juan, et al.Analysis of the U.S. information network security strategy in the era of big data[J].Net Info Security ,2012(8):32-35.
[2]江常青.大数据对国家网络安全的风险评估[J].中国信息安全,2015(5):53-54. JIANG Changqing.Big data risk assessment of national network security[J].China Information Security,2015(5):53-54.
[3]蔡钰.大数据时代信息网络安全的战略分析[J].陕西行政学院学报,2015(3):122-124. CAI Yu.Strategic analysis of information network security in big data era[J].Journal of Shaanxi Academy of Governance,2015(3):122-124.
[4]张利, 彭建芬, 杜宇鸽,等. 信息安全风险评估的综合评估方法综述[J]. 清华大学学报(自然科学版), 2012(10):1364-1369. ZHANG Li,PENG Jianfen,DU Yuge,et al.Information security risk assessment survey[J]. Tsinghua Univ(Sci & Tech),2012(10):1364-1369.
[5]刘佳,徐赐文.信息安全风险评估方法的比较分析[J].中央民族大学学报(自然科学版),2012,21(2):91-96. LIU Jia,XU Ciwen.Comparative analysis of on the information security risking-assessment methods[J].Journal of MUC( Natural Sciences Edition),2012,21(2):91-96.
[6]吴德,刘三阳.信息安全风险评估模型SVRAMIS[J].西安电子科技大学学报(自然科学版),2013,40(1):44-47, 154. WU De,LIU Sanyang.Risk assessment model of information security SVRAMIS[J].Journal of Xidian University(Natural Sciences Edition),2013,40(1):44-47,154.
[7]黄景文.信息安全风险因素分析的模糊群决策方法研究[J].山东大学学报(理学版),2012,47(11):45-49. HUANG Jingwen.Fuzzy group decision making for information security risk factors analysis[J].Journal of Shandong University (Natural Science),2012,47(11):45-49.
[8]曾忠平.信息安全人因风险研究进展综述[J].情报杂志,2014(4):6-11, 22. ZENG Zhongping.A comprehensive review of the theories and practices of human factor risk analysis in information security management[J].Journal of Intelligence,2014(4):6-11,22.
[9]陈火全. 大数据背景下数据治理的网络安全策略[J]. 宏观经济研究, 2015(8):76-84. CHEN Huoquan.Network security policy of data governance in big data context[J].Macroeconomics,2015(8):76-84.
[10]陈建昌.大数据环境下的网络安全分析[J].中国新通信,2013(17):13-16. CHEN Jianchang.Analysis of network security in big date environment[J]. China New Telecommunications,2013(17):13-16.
[11]张玉兰,陆松,邱岚.基于信息安全事件的应急处理机制研究与实践[J].信息安全与技术,2015,6(6):77-80. ZHANG Yulan,LU Song,QIU Lan,et al.Research and practice of information security emergency handling mechanism based on event[J].Cyberspace Security,2015,6(6):77-80.
[12]惠志斌.新安全观下中国网络信息安全战略的理论构建[J].国际观察,2012(2):17-22. HUI Zhibin. Theoretical construction of China's network information security strategy under the new security concept[J].International Review,2012(2):17-22.
[13]李晶. “棱镜”折射下的网络信息安全挑战及其战略思考[J]. 情报理论与实践, 2014, 37(4):48-52. LI Jing.The challenges and strategic thinking of the network information security reflected by the prism[J].Information Studies:Theory & Application,2014,37(4):48-52.
[14]李孟刚.国家信息安全问题研究[M] .北京:社会科学文献出版社, 2012.
[15]贺洪明.基于个人信息利用的安全管理研究[J].中共贵州省委党校学报,2015(3):88-91. HE Hongming.Research on security management based on personal information[J] .Journal of Guizhou Provincial Party School of the CPC,2015(3):88-91.
[16]范渊.智慧城市与信息安全[M].北京:电子工业出版社,2014.
[17] 蒋洁. 大数据轮动的隐私风险与规制措施[J]. 情报科学, 2014(6):18-23. JIANG Jie.Privacy risks of moved big data and related control measures[J].Information Science,2014(6):18-23.
[18]维克托·迈尔-舍恩伯格,肯尼思·库克耶 著,盛杨燕,周涛 译.大数据时代-生活工作与思维大变革[M] .杭州:浙江人民出版社,2013.
[19]马建堂.切实把握大数据时代的新机遇、新变革[N].经济日报,2016-01-11(14).
[20]刘德寰, 李雪莲. 大数据的风险和现存问题[J]. 广告大观:理论版, 2013(3):67-73. LIU Dehuan LI Xuelian.Risk and the existing problems of big data[J] .Outdoor Advertising(Theory Edition),2013(3):67-73.
[21]冯登国,张敏,李昊.大数据安全与隐私保护[J].计算机学报,2014,37(1):246-258. FENG Dengguo,ZHANG Min,LI Hao.Big data security and privacy protection[J].Chinese Journal of Computer,2014,37(1):246-258.
[22]马奔,毛庆铎.大数据在应急管理中的应用[J].中国行政管理,2015(3):136-141, 151. MA Ben,MAO Qingduo.The application of big data approach in emergency management[J].Chinese Public Administration ,2015(3):136-141,151.
[23]闪淳昌,薛澜.应急管理概论-理论与实践[M].北京:高等教育出版社,2012.
[24]程学旗,靳小龙,王元卓,等.大数据系统和分析技术综述[J].软件学报,2014,9(9):1889-1908. CHENG Xueqi,JIN Xiaolong,WANG Yuanzhuo,et al. Survey on big data system and analytic technology[J]. Journal of Software, 2014,9(9):1889-1908.
[25]童星,张海波.中国应急管理理论、实践、政策[M].北京:社会科学文献出版社,2012.
[26]刘铁民. 应急预案重大突发事件情景构建——基于“情景-任务-能力”应急预案编制技术研究之一[J]. 中国安全生产科学技术, 2012, 8(4):5-12. LIU Tiemin.Studies on scenes'construction of emergency planning——partⅠof emergency planning technology based on "scene-task-ability" [J].Journal of Safety Science and Technology,2012,8(4):5-12.

相似文献/References:

[1]谭东宁,于立友.关于在风电场安全评价中增加信息安全评价内容的建议[J].中国安全生产科学技术,2011,7(7):151.
 Tan Dongning,Yu Liyou.Suggestions on the information security evaluation content increased the safety evaluation of wind power farms[J].JOURNAL OF SAFETY SCIENCE AND TECHNOLOGY,2011,7(9):151.
[2]易高翔.重大危险源信息系统的研究与实践*[J].中国安全生产科学技术,2009,5(6):147.
 YI Gao xiang.Research and practice on the information system of major hazard installation[J].JOURNAL OF SAFETY SCIENCE AND TECHNOLOGY,2009,5(9):147.
[3]康良国,黄锐,吴超,等.安全心理大数据的基础性问题研究[J].中国安全生产科学技术,2017,13(7):5.[doi:10.11731/j.issn.1673-193x.2017.07.001]
 KANG Liangguo,HUANG Rui,WU Chao,et al.Research on fundamental problems of safety psychology big data[J].JOURNAL OF SAFETY SCIENCE AND TECHNOLOGY,2017,13(9):5.[doi:10.11731/j.issn.1673-193x.2017.07.001]
[4]王新浩,罗云,李桐,等.基于大数据的特种设备宏观安全风险预警方法研究[J].中国安全生产科学技术,2018,14(4):160.[doi:10.11731/j.issn.1673-193x.2018.04.025]
 WANG Xinhao,LUO Yun,LI Tong,et al.Research on method of macro safety risk early warning of special equipment based on big data[J].JOURNAL OF SAFETY SCIENCE AND TECHNOLOGY,2018,14(9):160.[doi:10.11731/j.issn.1673-193x.2018.04.025]
[5]徐坚强,刘小勇,苏燕飞,等.基于贝叶斯网络的建筑火灾动态风险评估方法研究[J].中国安全生产科学技术,2019,15(2):138.[doi:10.11731/j.issn.1673-193x.2019.02.022]
 XU Jianqiang,LIU Xiaoyong,SU Yanfei,et al.Study on dynamic risk assessment method of building fire based on Bayesian network[J].JOURNAL OF SAFETY SCIENCE AND TECHNOLOGY,2019,15(9):138.[doi:10.11731/j.issn.1673-193x.2019.02.022]
[6]陈涛,阮杨志,孙雪萍,等.城市运行与应急管理技术构架与应用模式研究[J].中国安全生产科学技术,2019,15(4):5.[doi:10.11731/j.issn.1673-193x.2019.04.001]
 CHEN Tao,RUAN Yangzhi,SUN Xueping,et al.Research on key technologies of integration of urban operation and emergency management[J].JOURNAL OF SAFETY SCIENCE AND TECHNOLOGY,2019,15(9):5.[doi:10.11731/j.issn.1673-193x.2019.04.001]
[7]荣莉莉,李群,于振.基于电力历史应急大数据的应急情景规则分析与发现方法研究[J].中国安全生产科学技术,2019,15(5):30.[doi:10.11731/j.issn.1673-193x.2019.05.005]
 RONG Lili,LI Qun,YU Zhen.Study on analysis and discovery methods of emergency scenario rules based on big data of electric power historical emergency[J].JOURNAL OF SAFETY SCIENCE AND TECHNOLOGY,2019,15(9):30.[doi:10.11731/j.issn.1673-193x.2019.05.005]

备注/Memo

备注/Memo:
-
更新日期/Last Update: 2017-10-12