计算机科学 ›› 2022, Vol. 49 ›› Issue (4): 67-73.doi: 10.11896/jsjkx.211000010
孙轩1,2,3, 王焕骁1
SUN Xuan1,2,3, WANG Huan-xiao1
摘要: 政务大数据是新时期数字政府建设的核心资产,对推动政府功能服务升级和经济、社会创新发展具有重要意义。但在复杂的网络流通环境下,为了保障政务大数据的合理、有序和可靠利用,其数据安全防护能力建设不容忽视。在技术层面,政务大数据安全防护涉及网络安全(Network Security)、平台安全(Platform Security)和应用安全(Application Security)等核心要素;在管理层面,政务大数据安全防护则需要重点关注人员素养(Personnel Quality)和制度质量(Institutional Quality)这两方面的内容。在理论探讨的基础上,给出了具体的技术和管理能力指标,并进一步对省级机关单位A的建设实践进行了分析。
中图分类号:
[1] SUN X,SUN T.Dynamic Urban Governance in a Big Data Computing Environment:Conceptual Connotation and Application Framework[J].E-government,2020(1):20-28. [2] MARRISON C.Gartner warns of big data security problems[J].Network Security,2014(6):1-20. [3] MEHMOOD A,NATGUNANATHAN I,XIANG Y,et al.Pro-tection of big data privacy[J].IEEE Access,2016,4:1821-1834. [4] CARDENAS A,MANADHATA P,RAJAN S.Big Data Analytics for Security[J].IEEE Security & Privacy,2013,11(6):74-76. [5] ERDMANN J.As Personal Genomes Join Big Data Will Privacy and Access Shrink?[J].Chemistry & Biology,2013,20(1):1-2. [6] WANG D,ZHAO W B,DING Z M.An Overview of Key Tech-nology Analysis of Big Data Security Assurance[J].Journal of Beijing University of Technology,2017,43(3):335-349,322. [7] CHEN X S,YANG L,LUO Y G.Big data security protection technology[J].Advanced Engineering Sciences,2017,49(5):1-12. [8] WEI K M,WENG J,REN K.Big data security protection technology[J].Chinese Journal of Network and Information Security,2016,2(4):1-11. [9] TIAN H L,ZHANG Y,XU X H,et al.Trusted solid state-drive:a new foundation for big data security[J].Chinese Journal of Computers,2016,39(1):154-168. [10] Information technology—Security techniques—Information se-curity management systems—Requirements:ISO/IEC 27001:2013[S].Switzerland:Schweizerische Normen-Vereinigung(SNV),2013. [11] TANKARD C.Big data security[J].Network Security,2012(7):5-8. [12] KSHETRI N.Big data’s impact on privacy,security and consumer welfare[J].Telecommunications Policy,2014,38(11):1134-1145. [13] FENG D G,ZHANG M,LI H.Big data security and privacy protection[J].Chinese Journal of Computers,2014,37(1):246-258. [14] TIAN W.The Connotation,Current Situation and Basis of Public Big Data Information Security Legislation[J].Henan Social Sciences,2018,26(7):86-91. [15] HAN W.The balance of security and freedom-analysis of the purpose of data security legislation[J].Science Technology and Law,2019(6):41-48,67. [16] HU K,LIU D,LIU M H.Research on the Security Understan-ding and Countermeasures of Big Data[J].Telecommunication Science,2014,30(2):112-117,122. [17] HUANG G B,ZHENG L.Research on Big Data Information Security Risk Framework and Countermeasures[J].Researches in Library Science,2015(13):24-29. [18] XU Y.Challenges and countermeasures facing China in the era of big data[J].Forum on Science and Technology in China,2015 (3):24-29. [19] LIU Y,DENG Q,PENG Y S.Security Challenges Facing Data Sovereignty and Privacy Protection in the Big Data Era[J].Modernization of Management,2019,39(1):104-107. [20] MENG X F,CHI X.Big data management:concepts,technolo-gies and challenges[J].Journal of Computer Research and Development,2013,50(1):146-169. [21] CHEN H,WANG X X,DUAN Y Q.Analysis and Research on the Value Orientation of Chinese Government’s Big Data Policy[J].Library and Information Service,2020,64(11):19-27. [22] ZHANG X J,WANG W Q,TANG C L.Research on the Policies and Regulations of China-US Government Data Opening and Personal Privacy Protection[J].Information Studies:Theory & Application,2016,39(1):38-43. [23] CAI Q X,HUANG R H.Policy and Regulation Guarantee of U.S.Government Data Opening and Its Enlightenment to my country[J].Library and Information,2017(1):10-17. [24] YU H.Opportunities,Challenges and Countermeasures of Go-vernment Data Management in the Big Data Era[J].Chinese Public Administration,2015(3):127-130. [25] DU H H.Research on the Construction of Evaluation Systemfor Privacy Protection of my country’s Government Data Open Platform[J].Journal of Information,2020(3):172-179. [26] WANG C H.Analysis of the Six Legal Systems of “Network Security Law”[J].Journal of Nanjing University of Posts and Telecommunications (Natural Science),2017,37(1):1-13. [27] The network security grade protection system 2.0 standard is officially released[EB/OL].(2019-05-16) [2021-09-13].http://it.people.com.cn/n1/2019/0516/c1009-31087714.html. [28] KOU G,WANG S,Tang G.Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction[J].Chinese Journal of Electronics,2019,28(1):166-175. [29] SINGH S,SHARMA P K,MOON S Y,et al.A comprehensive study on APT attacks and countermeasures for future networks and communications:challenges and solutions[J].Journal of Supercomputing,2016,75:4543-4574. [30] BREAUX T,BAUMER D.Legally “reasonable” security re-quirements:A 10-year FTC retrospective-Science Direct[J].Computers & Security,2011,30(4):178-193. [31] LIN C,SU W B,MENG K,et al.Cloud computing security:architecture,mechanism and model evaluation[J].Chinese Journal of Computers,2013,36(9):1765-1784. [32] JAIN R,PAUL S.Network virtualization and software defined networking for cloud computing:a survey. [J].IEEE Communications Magazine,2013,51(11):24-31. [33] FAWCETT L,SCOTT-HAYWARD S,BROADBENT M,et al.Tennison:A Distributed SDN Framework for Scalable Network Security[J].IEEE Journal on Selected Areas in Communications,2018,36(12):2805-2818. [34] LI B H,LI B,REN W,et al.Research on Resource Security Management Mechanism Oriented to Trusted Cloud Computing[J].Journal of Cyber Security,2018,3(2):76-86. [35] ZHANG K,MA L,XU Y F.Research on Security Assurance System of Complex Information System[J].Chinese Journal of Management Science,2000(S1):336-346. [36] LI J H.Overview of Threat Intelligence Awareness,Sharing and Analysis Technology in Cyberspace[J].Chinese Journal of Network and Information Security,2016,2(2):16-29. [37] DING H F,MENG Q Q,WANG X,et al.Analysis of data security and privacy protection countermeasures of government data opening oriented to data life cycle[J].Journal of Information,2019,38(7):151-159. [38] CHEN C B,CHENG S.Regulatory Responsibility in Government Data Opening:Practical Dilemma and Optimal Path[J].Journal of Information,2019,38(10):188-194. |
[1] | 肖军. 人脸识别技术在公安领域内的应用研究 Research on Application of Face Recognition in Area of Public Security 计算机科学, 2016, 43(Z11): 127-132. https://doi.org/10.11896/j.issn.1002-137X.2016.11A.027 |
[2] | . MPLS网络环境下组播应用研究 计算机科学, 2006, 33(1): 25-27. |
[3] | 汪洋 余少华. 超立方体网络中路由生成算法的子立方分裂方法 计算机科学, 2005, 32(4): 16-18. |
|