In view of the strategic value of big data resources in national security, in addition to strengthening the construction of basic software and hardware facilities, network attack monitoring and protection, the following suggestions are put forward for domestic big data services and big data applications.
Conduct a national cybersecurity review of important big data applications or services. Incorporate important big data applications or services related to the national economy and people's livelihood and government governance into the scope of national cybersecurity review, and clearly formulate security assessment specifications as soon as possible to ensure that these big data platforms have strict and reliable security measures to prevent attacks and hostile forces.
Reasonable restrictions on the use of social networking tools by sensitive and important departments. Government departments, central enterprises and important information system units should avoid or restrict the use of social networking tools as communication tools in their daily work, and use office mobile terminals and personal mobile terminals respectively to prevent the disclosure of important confidential information.
Sensitive and important departments should use third-party cloud computing services with caution. Cloud computing service is the main carrier of big data. More and more government departments, enterprises and institutions have established e-government and enterprise business systems on the third-party cloud computing platform. However, due to the lack of security awareness, security expertise and security measures, the security of the third-party cloud computing platform itself is often not guaranteed. Therefore, governments, central enterprises and important information system units should be cautious when using third-party cloud services and avoid using public cloud services. At the same time, the state should issue relevant norms and standards for cloud service security assessment and testing as soon as possible.
Strictly regulate and restrict the cross-border flow of data from overseas institutions. Overseas institutions that provide big data applications or services in China should undergo more stringent network security audits to ensure that their data are stored on domestic servers and strictly limit the cross-border flow of data.
The above is the related content of "Information Security Status and Countermeasures and Suggestions in the Age of Big Data" compiled by Bian Xiao today. I hope it will help everyone. In general, the value of big data is immeasurable, and the future development prospects are also very impressive, so interested friends, start learning as soon as possible!