检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:郑川[1,4] 曹阳 向禹 吴珮嘉[3] ZHENG Chuan;CAO Yang;XIANG Yu;WU Pei-jia(Institute of Archival Technology,Central South University,Changsha 410083;Archives of Central South University,Changsha 410083;Archives Regulations Office of the General Office of the CPC Hunan Provincial Committee,Changsha 410000)
机构地区:[1]中南大学档案技术研究所,长沙410083 [2]中南大学档案馆,长沙410083 [3]中共湖南省委办公厅档案法规处,长沙410000 [4]中南大学档案馆技术部,长沙410083
出 处:《山西档案》2021年第2期25-34,共10页Shanxi Archives
基 金:湖南省档案科技项目“基于区块链的电子档案可信度保障技术研究”(2018-H-14)研究成果之一;湖南省社科基金项目“大学生培养过程电子档案单套制实施策略探索与研究”(19YBA357)研究成果之一。
摘 要:2017年《中华人民共和国网络安全法》的施行将等级保护工作提升到法律层面,随后9个相关国家标准先后完成修订,原档案信息系统安全等级保护相关文件的局限性逐渐凸显。在分析当前档案信息化建设面临云计算、物联网、大数据、移动互联网的新技术环境与我国等级保护2.0体系要求变化的基础上,构建了包含法规标准层、对象层、保障层、制度层、目标层的档案网络安全等级保护框架,梳理了档案网络安全等级保护工作的角色和流程,提出了重视新技术档案安全扩展要求建设、构建纵深互补的档案安全防御体系、保证档案系统内外一致的安全强度、健全长效的档案安全集中管理机制的档案网络安全建设建议。The implementation of the Internet Security Law of the people's Republic of China in 2017 has promoted the work of classified protection to the legal level.Subsequently,nine relevant national standards were revised successively.The limitation of the original archives information system security classified protection related documents is gradually highlighted.This paper analyzes the new technology environment of cloud computing,Internet of things,big data and mobile Internet in the current archives informatization construction,and the changes of China's classified protection 2.0 system requirements.The new technology environment of cloud computing,Internet of things,big data and mobile Internet in the current archives informatization construction,and the changes of China's classified protection 2.0 system requirements were analyzed.This paper constructs a classified protection framework of archival network security,which includes standard layer,object layer,guarantee layer,system layer and target layer,and combs the role and process of classified protection of archival network security,and puts forward some suggestions on the construction of archives network security,such as attaching importance to the construction of new technology archives security expansion requirements,building a complementary archives security defense system,ensuring the consistent security intensity inside and outside the archives system,and improving the long-term centralized management mechanism of archives security.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.46