Page 11 - 大数据背景下网络安全问题研究
P. 11

目 录




                                                                                CONTENTS






               第一章  信息安全概述····················································································· 1
                   第一节  信息安全的基本属性及其相关应用技术·············································· 1

                   第二节  信息安全的发展趋势分析······························································· 28

               第二章  信息安全工程实践应用 ······································································· 33
                   第一节  信息安全工程等级的划分及特征······················································ 33
                   第二节  信息安全工程建设的主要内容························································· 37

                   第三节  信息安全风险评估及方案定制························································· 41

                   第四节  数据备份常见方法分类  ································································· 57
               第三章  信息安全管理体系的构建与认证 ··························································· 63
                   第一节  信息安全管理体系的发展历程及标准················································ 63

                   第二节  信息安全管理体系基本流程···························································· 68

                   第三节  信息安全管理体系的认证······························································· 71
               第四章  网络攻击与漏洞利用 ·········································································· 77
                   第一节  计算机漏洞 ················································································· 77

                   第二节  人工智能赋能网络攻击的安全威胁··················································· 89

                   第三节  网络空间安全防御 ······································································ 105
               第五章  机器学习在网络信息安全中的应用 ·······················································113
                   第一节  机器学习概述 ·············································································113

                   第二节  机器学习的应用范围及发展···························································117

               第六章  网络数据采集及安全研究 ·································································· 137
                   第一节  网络数据采集技术概述 ································································ 137
                   第二节  基于大数据的网络安全分析·························································· 155

                   第三节  网络数据传输和安全 ··································································· 161

                   第四节  网络数据加密技术 ······································································ 171
   6   7   8   9   10   11   12   13   14   15   16