Academic Journal of Computing & Information Science, 2020, 3(2); doi: 10.25236/AJCIS.2020.030211.
China academy of information and communications, 100037, Beijing, China
With the continuous development of global network informatization, various types of network security problems have emerged. By analysing various practical problems of network and information security faced by mobile operators, this paper gives the construction goals and principles of mobile operator network security management platform, proposes a security strategy as the centre, and security inspection as the engine to drive The overall architecture of the network security management platform of project business function modules. The architecture includes the construction of a complete network security management platform such as system framework, platform function division, and business interaction process. Practice shows that the mobile operator's network security management platform adopting this solution can solve the construction goals of quantifiable network security management and control, visualization of security situation, and guarantee of soft and hard data.
Bad information, governance, Internet, operators
Wei Wu. Research on Governance of Bad Network Information Based on Operators. Academic Journal of Computing & Information Science (2020), Vol. 3, Issue 2: 77-84. https://doi.org/10.25236/AJCIS.2020.030211.
 Egners, André, Herrmann, P. & Meyer, U. Multi-operator wireless mesh networks secured by an all-encompassing security architecture. International Journal of Information Security, 14 (2) (2015) 169-186.
 Petermeijer, S. M. Abbink, D. A. & winter, J. C. F. D. Should drivers be operating within an automation-free bandwidth? Evaluating haptic steering support systems with different levels of authority. Human Factors, 57 (1) (2015) 5-20.
 Kuldeep Nagiya, Mangey Ram, & Ayush Kumar Dua. A tree topology network environment analysis under reliability approach. Nonlinear studies, 24 (1) (2017) 193-202.
 Gangele, S, & Patil, S. Internet traffic distribution analysis in case of multi-operator and multi-market environment of computer network. International Journal of Computer Applications, 130 (4) (2015) 29-36.