当前位置:网站首页>An overall security understanding and method of cyberspace based on connection and security entropy
An overall security understanding and method of cyberspace based on connection and security entropy
2022-08-09 22:06:00 【Midor Tech House】
Summary
The characteristics of the cyberspace itself, such as diversity of structure, random access, and multi-domain linkage, make the security perspective, connotation and elements of its security situation need to constantly adapt to the development and changes of new network forms.On the basis of analyzing the current situation of cyberspace security development at home and abroad, it points out the security risks and challenges facing the current cyberspace;Based on the analysis and discussion of cyberspace security issues based on connections, the overall cyberspace security concept of "D-I-D-E network data-driven loop" is proposed, and its application value is discussed.The purpose is to propose a solution to security problems from a new perspective, further expand and supplement the current cyberspace security cognition, and provide theoretical reference for network information system planning, design, construction and later security enhancement and reinforcement.
Content Directory:
1 Development status and challenges of cyberspace security protection
1.1 Development Status
1.2 Challenges
2 Reflections on the overall security of cyberspace based on connection and security entropy
2.1 Mathematical model of cyberspace security based on connection and security entropy
2.2 Discussion on the overall security of cyberspace
3 Application of the overall security method in cyberspace
3.1 Provide reference for network information system planning, design, construction and later security enhancement and reinforcement
3.2 Overall security analysis of network information system security issues
4 Conclusion
Cyberspace is a kind of information infrastructure including the Internet, Internet of Things, communication network, industrial control network, etc. It is a virtual and real space formed by the interconnection and interaction of "human-machine-object".Network connection is the basic premise of the network, data exchange is the basic function of the network, and drive execution is the basic goal of the network.The network not only connects information data to cyberspace for processing and exchange, but also connects real entities to cyberspace for execution and feedback.Therefore, on the basis of enhancing the value and role of real entities in the network, cyberspace realizes a new space where virtual and real are closely connected and integrated, driven by network connections.
With the accelerated iteration and deployment of information technology and equipment, the network scale has been further expanded
边栏推荐
猜你喜欢
加工制造业智慧采购系统解决方案:助力企业实现全流程采购一体化协同
Openharmony轻量系统实验--GPIO点灯
【图文并茂】如何进行Win7系统的重装
leetcode二叉搜索树与双向链表
《评估、创建和使用知识图谱的限制》2022最新230页博士论文,根特大学
启动 CM agent 报错——ImportError: libssl.so.10: cannot open shared object file: No such file or directory
渗透测试-对新型内存马webshell的研究
获取数组最后一项别再用array.length-1了
力扣383-赎金信——哈希映射数组法
leetcode 二叉树的分层遍历1
随机推荐
力扣383-赎金信——哈希映射数组法
如何在WPF中设置Grid ColumnDefinitions的样式
Toronto Research Chemicals加米霉素-d4说明书
laravel 时区问题timezone
win10配置CenterNet环境
获取一段程序运行的时间
解决执行Command报错executable file not found in $PATH
下秒数据:湖仓一体带来的现代数据堆栈变革开始了
shell之变量详解,让你秒懂!
【kali-权限提升】(4.2.7)社会工程学工具包:权限维持创建后门、清除痕迹
线性表的定义和基本操作
MySQL笔记-06 基础SQL操作
小满nestjs(第四章 前置知识装饰器-实现一个GET请求)
数据集成API如何成为企业数字化转型的关键?
毕昇编译器优化:Lazy Code Motion
为什么maxcompute的数据导入到mysql会乱码?mysql的表是udf8mb4的编码
Queue topic: Implementing stacks with queues
小满nestjs(第五章 nestjs cli)
基于模糊PID控制器的水温控制系统仿真
Prometheus Operator 自定义监控添加redis explorer