{"title":"Safe operation and maintenance management and control technology based on grade protection 2.0","authors":"Yue Sun, Wei Chen, Qinglin Yuan, Yin Yuan","doi":"10.1145/3501409.3501468","DOIUrl":null,"url":null,"abstract":"With the rapid development of technologies such as the Internet of Things and 5G communications, the intelligent era of the Internet of Everything is accelerating. This situation poses a huge challenge to the currently widely used cloud computing model. Edge computing is a new computing model that provides intelligent services at the edge of the network close to the source of things or data. It can save network traffic, improve response speed and protect user privacy. It shows better performance than cloud computing in IoT applications, has been highly concerned and unanimously recognized by the industry and academia. With the rapid development of my country's economy, information-based production tools have entered all aspects of people's work and life such as industry, agriculture, commerce, medical care, education, etc., and online commerce, online banking, and online medical services that involve personal private information. Services are increasing, and national military and political intelligence is transmitted more frequently through the Internet. Under this circumstance, ensuring the security of information has increasingly become the most urgent problem that needs to be solved quickly in today's society. It is occupies the most important position in the national industrial layout and even the national security strategy pattern. In this context, with \"Grade protection 2.0\" as the standard, the core content of \"Grade protection 2.0\" is \"one center, triple protection\". That is to build a security management center, do a good job in the protection of the computing environment, regional boundaries and communication networks, and form a comprehensive network security defense system.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3501409.3501468","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the rapid development of technologies such as the Internet of Things and 5G communications, the intelligent era of the Internet of Everything is accelerating. This situation poses a huge challenge to the currently widely used cloud computing model. Edge computing is a new computing model that provides intelligent services at the edge of the network close to the source of things or data. It can save network traffic, improve response speed and protect user privacy. It shows better performance than cloud computing in IoT applications, has been highly concerned and unanimously recognized by the industry and academia. With the rapid development of my country's economy, information-based production tools have entered all aspects of people's work and life such as industry, agriculture, commerce, medical care, education, etc., and online commerce, online banking, and online medical services that involve personal private information. Services are increasing, and national military and political intelligence is transmitted more frequently through the Internet. Under this circumstance, ensuring the security of information has increasingly become the most urgent problem that needs to be solved quickly in today's society. It is occupies the most important position in the national industrial layout and even the national security strategy pattern. In this context, with "Grade protection 2.0" as the standard, the core content of "Grade protection 2.0" is "one center, triple protection". That is to build a security management center, do a good job in the protection of the computing environment, regional boundaries and communication networks, and form a comprehensive network security defense system.