Safe operation and maintenance management and control technology based on grade protection 2.0

Yue Sun, Wei Chen, Qinglin Yuan, Yin Yuan
{"title":"Safe operation and maintenance management and control technology based on grade protection 2.0","authors":"Yue Sun, Wei Chen, Qinglin Yuan, Yin Yuan","doi":"10.1145/3501409.3501468","DOIUrl":null,"url":null,"abstract":"With the rapid development of technologies such as the Internet of Things and 5G communications, the intelligent era of the Internet of Everything is accelerating. This situation poses a huge challenge to the currently widely used cloud computing model. Edge computing is a new computing model that provides intelligent services at the edge of the network close to the source of things or data. It can save network traffic, improve response speed and protect user privacy. It shows better performance than cloud computing in IoT applications, has been highly concerned and unanimously recognized by the industry and academia. With the rapid development of my country's economy, information-based production tools have entered all aspects of people's work and life such as industry, agriculture, commerce, medical care, education, etc., and online commerce, online banking, and online medical services that involve personal private information. Services are increasing, and national military and political intelligence is transmitted more frequently through the Internet. Under this circumstance, ensuring the security of information has increasingly become the most urgent problem that needs to be solved quickly in today's society. It is occupies the most important position in the national industrial layout and even the national security strategy pattern. In this context, with \"Grade protection 2.0\" as the standard, the core content of \"Grade protection 2.0\" is \"one center, triple protection\". That is to build a security management center, do a good job in the protection of the computing environment, regional boundaries and communication networks, and form a comprehensive network security defense system.","PeriodicalId":191106,"journal":{"name":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3501409.3501468","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

With the rapid development of technologies such as the Internet of Things and 5G communications, the intelligent era of the Internet of Everything is accelerating. This situation poses a huge challenge to the currently widely used cloud computing model. Edge computing is a new computing model that provides intelligent services at the edge of the network close to the source of things or data. It can save network traffic, improve response speed and protect user privacy. It shows better performance than cloud computing in IoT applications, has been highly concerned and unanimously recognized by the industry and academia. With the rapid development of my country's economy, information-based production tools have entered all aspects of people's work and life such as industry, agriculture, commerce, medical care, education, etc., and online commerce, online banking, and online medical services that involve personal private information. Services are increasing, and national military and political intelligence is transmitted more frequently through the Internet. Under this circumstance, ensuring the security of information has increasingly become the most urgent problem that needs to be solved quickly in today's society. It is occupies the most important position in the national industrial layout and even the national security strategy pattern. In this context, with "Grade protection 2.0" as the standard, the core content of "Grade protection 2.0" is "one center, triple protection". That is to build a security management center, do a good job in the protection of the computing environment, regional boundaries and communication networks, and form a comprehensive network security defense system.
基于等级保护2.0的安全运维管控技术
随着物联网、5G通信等技术的快速发展,万物互联的智能时代正在加速到来。这种情况对目前广泛使用的云计算模型提出了巨大的挑战。边缘计算是一种新的计算模型,它在靠近事物或数据来源的网络边缘提供智能服务。它可以节省网络流量,提高响应速度,保护用户隐私。它在物联网应用中表现出优于云计算的性能,受到业界和学术界的高度关注和一致认可。随着我国经济的快速发展,信息化生产工具已经进入了工业、农业、商业、医疗、教育等人们工作和生活的方方面面,涉及个人隐私信息的网上商务、网上银行、网上医疗服务等。服务不断增加,国家军事和政治情报更频繁地通过互联网传播。在这种情况下,确保信息的安全日益成为当今社会急需解决的问题。它在国家产业布局乃至国家安全战略格局中占据着最重要的地位。在此背景下,以“等级保护2.0”为标准,“等级保护2.0”的核心内容是“一个中心,三重保护”。即建设安全管理中心,做好计算环境、区域边界和通信网络的保护工作,形成全面的网络安全防御体系。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信