{"title":"电子政务信息安全的风险与防范","authors":"Jun Wang","doi":"10.1109/ITAPP.2010.5566651","DOIUrl":null,"url":null,"abstract":"Risk points in the physical layer, network layer, system layer, application layer and management layer exist in the information security of E-governmental administration. In order to effectively guard against these security risks,a system including basic safety facilities, technical support, operation management and social services must be constructed.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"119 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Risk and Prevention on Information Security of E-Governmental Administration\",\"authors\":\"Jun Wang\",\"doi\":\"10.1109/ITAPP.2010.5566651\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Risk points in the physical layer, network layer, system layer, application layer and management layer exist in the information security of E-governmental administration. In order to effectively guard against these security risks,a system including basic safety facilities, technical support, operation management and social services must be constructed.\",\"PeriodicalId\":116013,\"journal\":{\"name\":\"2010 International Conference on Internet Technology and Applications\",\"volume\":\"119 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Internet Technology and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITAPP.2010.5566651\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Internet Technology and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITAPP.2010.5566651","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Risk and Prevention on Information Security of E-Governmental Administration
Risk points in the physical layer, network layer, system layer, application layer and management layer exist in the information security of E-governmental administration. In order to effectively guard against these security risks,a system including basic safety facilities, technical support, operation management and social services must be constructed.