Information Security Protection Strategy Based on Computer Big Data Technology

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Under the background of big data era, network information has become an important part in the development of modern society. At the same time, computer information security has also suffered an unprecedented impact, corporate secrets stolen, personal privacy has been exposed and other incidents emerge in endlessly. It is an urgent time to strengthen information security protection. Therefore, this paper puts forward the research work of information security protection strategy based on computer big data technology. This paper makes an in-depth investigation on the current situation of computer information security protection. According to the investigation, most enterprises think it is necessary to strengthen the information security protection, but few of them are actually applied to the work. The analysis shows that the main reason is that the information security protection is difficult, the influencing factors are complex, and the investment cost is high. In view of these problems, this paper makes an investigation on the factors affecting the computer network information security, and puts forward effective improvement measures. This measure strengthens the construction of protection software and emphasizes the cultivation of enterprise's information protection awareness. Through the relevant investigation, we can see that after adopting the information security protection measures, the enterprise's computer information security has been effectively guaranteed.

Cite

CITATION STYLE

APA

Zhang, Y., & Sun, Q. (2021). Information Security Protection Strategy Based on Computer Big Data Technology. In Journal of Physics: Conference Series (Vol. 1744). IOP Publishing Ltd. https://doi.org/10.1088/1742-6596/1744/4/042177

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free