{"title":"网络安全策略及其应用的结构化研究","authors":"Shanti Makka, Tripti Misra, Rajesh Deorari, D. Kumar, Vikas Kumar, Bhaker Pant","doi":"10.1109/IC3I56241.2022.10072695","DOIUrl":null,"url":null,"abstract":"Organizations can utilize big data to spread information over a network, analyses vast amounts of complex data, and find hidden trends and correlations. The deployment of a platform that is both effective and secure is required since the information that moves across the networking of an institution is frequently important. Entire network has thus been promoted to the early stages of evaluation in the context of big data. computer protection technologies are created to recognize and thwart possible attacks in a real-time environment. must manage a significant volume of data that is both complex and varied. Unfortunately, because these systems are usually created using outdated techniques, securing vast volumes of information can be difficult. In this post, we’ll mostly talk about information protection for massive volumes of data and network security solutions. We start by talking about the variables that affect network security design in the Big Data environment. Then, we’ll talk about a few big data solutions that provide network-wide data protection in addition to current study findings.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Structured Investigation of Network Security Strategies and its Applications\",\"authors\":\"Shanti Makka, Tripti Misra, Rajesh Deorari, D. Kumar, Vikas Kumar, Bhaker Pant\",\"doi\":\"10.1109/IC3I56241.2022.10072695\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Organizations can utilize big data to spread information over a network, analyses vast amounts of complex data, and find hidden trends and correlations. The deployment of a platform that is both effective and secure is required since the information that moves across the networking of an institution is frequently important. Entire network has thus been promoted to the early stages of evaluation in the context of big data. computer protection technologies are created to recognize and thwart possible attacks in a real-time environment. must manage a significant volume of data that is both complex and varied. Unfortunately, because these systems are usually created using outdated techniques, securing vast volumes of information can be difficult. In this post, we’ll mostly talk about information protection for massive volumes of data and network security solutions. We start by talking about the variables that affect network security design in the Big Data environment. Then, we’ll talk about a few big data solutions that provide network-wide data protection in addition to current study findings.\",\"PeriodicalId\":274660,\"journal\":{\"name\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"volume\":\"82 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3I56241.2022.10072695\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I56241.2022.10072695","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Structured Investigation of Network Security Strategies and its Applications
Organizations can utilize big data to spread information over a network, analyses vast amounts of complex data, and find hidden trends and correlations. The deployment of a platform that is both effective and secure is required since the information that moves across the networking of an institution is frequently important. Entire network has thus been promoted to the early stages of evaluation in the context of big data. computer protection technologies are created to recognize and thwart possible attacks in a real-time environment. must manage a significant volume of data that is both complex and varied. Unfortunately, because these systems are usually created using outdated techniques, securing vast volumes of information can be difficult. In this post, we’ll mostly talk about information protection for massive volumes of data and network security solutions. We start by talking about the variables that affect network security design in the Big Data environment. Then, we’ll talk about a few big data solutions that provide network-wide data protection in addition to current study findings.