Research on Intelligent Perception and Cognitive Computing of Information Security System Based on Computer Big Data
Since the 21st century, the development of network technology has entered a new stage, and mankind has gradually entered the era of big data with information explosion. Computer big data technology has changed people’s lifestyles. People can obtain information and materials without going out to prov...
Guardado en:
Autores principales: | , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Hindawi-Wiley
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/bbd0c7b4b4c942c4bf531d396fe2970d |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Sumario: | Since the 21st century, the development of network technology has entered a new stage, and mankind has gradually entered the era of big data with information explosion. Computer big data technology has changed people’s lifestyles. People can obtain information and materials without going out to provide convenience for people’s lives. But it is affected in many ways, but we will also encounter some difficulties in the process of using it. Informatization has had a profound impact on many areas of human social life. Especially in the context of global informationization, the information security (IS) problems encountered by China at this stage are more prominent and obvious than ever before. IS issues have also become a hot topic for many scholars to pay attention to and study. Informatization has gradually penetrated into every aspect of daily production work. However, the flow of enterprise informatization has made the public suffer from IS problems while improving office efficiency. This paper analyzes the shortcomings of current enterprise IS situation awareness; studies the construction of enterprise IS situation awareness system through big data technology, artificial intelligence algorithm, and threat intelligence technology; and puts forward the enterprise level IS situation awareness system model, situation awareness system, architecture, and specific implementation method. After analyzing the system design and deployment, the threats to corporate IS can be discovered in a more timely manner, and based on risk judgment and threat tracking, the company’s detection capabilities against security threats and security attacks can be improved, and effective security incident handling can be provided. Supported by technical means, the security situational awareness system will bring different protection and prevention to our enterprise. |
---|