Welcome to Francis Academic Press

International Journal of Frontiers in Sociology, 2021, 3(1); doi: 10.25236/IJFS.2021.030113.

Computer Network Security Maintenance and Management in the Era of Big Data

Author(s)

Liang Xing

Corresponding Author:
Liang Xing
Affiliation(s)

Jilin Engineering Normal University, Changchun, China

Abstract

With the development of information technology, the big data network has been initially formed. However, the network security problem is becoming more and more serious in this environment. China has put the network security in an important position of national security. This paper analyzes the text of China's network security governance policy from the perspective of big data, builds an analysis framework based on big data, analyzes the relevant provisions of China's network security governance policy, analyzes the existing problems and puts forward optimization suggestions, in order to provide reference for the formulation of China's network security governance policy and improve China's network security governance policy system. This paper collects the information of network security incidents and policies in 2020 from Google data analysis platform. After preliminary collection and sorting, 195 relevant policies on network security governance are obtained. In order to ensure the accuracy and pertinence of the materials, all policies are analyzed. The research results show that the application of some big data of network security governance is concentrated on the regulatory level, lacking specific implementation rules and methods. There are 183 policies involving regulatory control, accounting for 31.6%. Therefore, the national network information department should cooperate with the legislative department to formulate policies for the problems in the network ecosystem. Network is not only the extension of people's daily life, but also an important part of economic and social life.

Keywords

Big Data Era, Computer Network Security, Maintenance and Management, Information Security

Cite This Paper

Liang Xing. Computer Network Security Maintenance and Management in the Era of Big Data. International Journal of Frontiers in Sociology (2021), Vol. 3, Issue 1: 104-111. https://doi.org/10.25236/IJFS.2021.030113.

References

[1] Bala R. A Review On Kdd Cup99 And Nsl-Kdd Dataset [J]. International Journal of Advanced Research in Computer Science. 2019, 10(2): 64-66.

[2] Chawla N V, Bowyer K W, Hall L O, Et Al. Smote: Synthetic Minority Over-sampling Technique [J]. Journal of Artificial Intelligence Research, 2020, 16(1): 321-357.

[3] Randy Borum, John Felker,Sean Kern. Strategic cyber intelli gence[J]. Information and Computer Security, 2019, 23(3):31-332.

[4] Sara Qamar,Zahid Anwar. Data-driven analytics for cyber-threat intelligence and informantion sharing[J]. Computers & Security, 2017, 6(7):35-58.

[5] Xu Shubin, Gan Zhiwang. Research status and development trend of 5G security technology [J]. Radio Communication Technology, 2020, 46(2): 133-138.

[6] Xu Xiaolin, Liu Shuai, Mao Zijun. Research on network security issues and governance in China's border areas [J]. Electronic Government Affairs, 2020, 6(2): 46-54.

[7] Wang Daozheng, Hu Ju. Vietnam's characteristic cyber security governance practices-Observation of Vietnam's "Cyber Security Law"[J]. Intelligence Magazine, 2019, 38(2): 105-109.

[8] Zhou Yi. Network information content governance from the perspective of overall national security: progress, connotation and research logic [J]. Intelligence Theory and Practice, 2020, 43(8): 44-50.

[9] Li Haoqing. Research on the ecological governance of network rumors facing political security[J]. Modern Information, 2018, 38(10): 43-50.

[10] Huang Lina, Huang Lu. Policy Tools for Internet Governance in China: Formation, Selection and Optimization——Based on the Content Analysis of Internet Policy Texts from 1994 to 2017 [J]. Intelligence Magazine, 2020, 39(4): 90-97.

[11] Wu Zhiyong, Zhao Beihong. Changes in China Internet News Policy and Policies in the Past Twenty Years [J]. Modern Communication, 2016, 38(2): 134-139.