Page 11 - 大数据背景下网络安全问题研究
P. 11
目 录
CONTENTS
第一章 信息安全概述····················································································· 1
第一节 信息安全的基本属性及其相关应用技术·············································· 1
第二节 信息安全的发展趋势分析······························································· 28
第二章 信息安全工程实践应用 ······································································· 33
第一节 信息安全工程等级的划分及特征······················································ 33
第二节 信息安全工程建设的主要内容························································· 37
第三节 信息安全风险评估及方案定制························································· 41
第四节 数据备份常见方法分类 ································································· 57
第三章 信息安全管理体系的构建与认证 ··························································· 63
第一节 信息安全管理体系的发展历程及标准················································ 63
第二节 信息安全管理体系基本流程···························································· 68
第三节 信息安全管理体系的认证······························································· 71
第四章 网络攻击与漏洞利用 ·········································································· 77
第一节 计算机漏洞 ················································································· 77
第二节 人工智能赋能网络攻击的安全威胁··················································· 89
第三节 网络空间安全防御 ······································································ 105
第五章 机器学习在网络信息安全中的应用 ·······················································113
第一节 机器学习概述 ·············································································113
第二节 机器学习的应用范围及发展···························································117
第六章 网络数据采集及安全研究 ·································································· 137
第一节 网络数据采集技术概述 ································································ 137
第二节 基于大数据的网络安全分析·························································· 155
第三节 网络数据传输和安全 ··································································· 161
第四节 网络数据加密技术 ······································································ 171

