当前位置:网站首页>An overall security understanding and method of cyberspace based on connection and security entropy
An overall security understanding and method of cyberspace based on connection and security entropy
2022-08-09 22:06:00 【Midor Tech House】
Summary
The characteristics of the cyberspace itself, such as diversity of structure, random access, and multi-domain linkage, make the security perspective, connotation and elements of its security situation need to constantly adapt to the development and changes of new network forms.On the basis of analyzing the current situation of cyberspace security development at home and abroad, it points out the security risks and challenges facing the current cyberspace;Based on the analysis and discussion of cyberspace security issues based on connections, the overall cyberspace security concept of "D-I-D-E network data-driven loop" is proposed, and its application value is discussed.The purpose is to propose a solution to security problems from a new perspective, further expand and supplement the current cyberspace security cognition, and provide theoretical reference for network information system planning, design, construction and later security enhancement and reinforcement.
Content Directory:
1 Development status and challenges of cyberspace security protection
1.1 Development Status
1.2 Challenges
2 Reflections on the overall security of cyberspace based on connection and security entropy
2.1 Mathematical model of cyberspace security based on connection and security entropy
2.2 Discussion on the overall security of cyberspace
3 Application of the overall security method in cyberspace
3.1 Provide reference for network information system planning, design, construction and later security enhancement and reinforcement
3.2 Overall security analysis of network information system security issues
4 Conclusion
Cyberspace is a kind of information infrastructure including the Internet, Internet of Things, communication network, industrial control network, etc. It is a virtual and real space formed by the interconnection and interaction of "human-machine-object".Network connection is the basic premise of the network, data exchange is the basic function of the network, and drive execution is the basic goal of the network.The network not only connects information data to cyberspace for processing and exchange, but also connects real entities to cyberspace for execution and feedback.Therefore, on the basis of enhancing the value and role of real entities in the network, cyberspace realizes a new space where virtual and real are closely connected and integrated, driven by network connections.
With the accelerated iteration and deployment of information technology and equipment, the network scale has been further expanded
边栏推荐
猜你喜欢
随机推荐
[Free column] APK dynamic reverse application of Android security [Three Smali injection methods]
mysql 重复数据 分组 多条最新的记录
下秒数据:湖仓一体带来的现代数据堆栈变革开始了
以技术创新加速国家“碳中和”建设进程,华为云创新中心助力欣冠精密实现云智控“气”
基于模糊PID控制器的水温控制系统仿真
MySQL, which is asked on both sides of the byte, almost didn't answer well
Overview of Security Analysis Technology for Smart Home Devices
使用Mock技术模拟数据
源码编译安装与yum和rpm软件安装详解
真香|持一建证书央企可破格录取
听音识情绪 | 程序员手把手教你搭建神经网络,更快get女朋友情绪,求生欲max!
Laravel DB批量更新的方法
【Unity3D】2D动画
华为云创新中心助力启泰智能 补齐中小模具企业数字化能力短板
请问一下flink cdc mysql source 报这种错怎么处理呢?我都设置了useSSL=f
继承关系下构造方法的访问特点
Js查找字符串中出现最多次数的字母和单词
39. 组合总和 && 40. 组合总和2 && 216. 组合总和3
【IoT毕设】STM32与机智云自助开发平台的宠物智能喂养系统
企业数据打通有什么好处?不同行业怎么解决数据打通难题?









