首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 20 毫秒
1.
搜索引擎机器人的自动采集行为可能会引起信息安全问题,机器人排除协议(REP)可以将全部或部分网站内容排除在机器人的采集范围之外。通过国内外政府网站应用REP协议的调查,发现国内政府网站很少使用REP协议限制机器人的行为。通过科学合理的利用REP协议设置排除规则,可以在一定程度上保护政府网站的信息安全。  相似文献   

2.
随着云计算技术与服务的广泛应用与深度渗透,数据密集型科学出现。云环境中的科学数据既面临传统的安全风险,也遇到新型的安全威胁。从所涉主体的不同,云环境中数据安全风险的致因可分为4类:由研发人员访问科学数据库引发;作者通过云平台进行论文投稿并上传数据所蕴含;政府部门建立科学数据云平台并提供数据服务所致;别有用心的外国政府持续的监视活动。科学数据安全风险的治理范式经历了从单一的技术治理、法律治理到复合型"技术+法律"治理的发展路径。我国当下治理科学数据安全风险的对策主要包括:大力发展云安全产业、构建数据保护法律体系和加强政府数据监管。  相似文献   

3.
[目的/意义] 研究大数据时代信息安全的特点,探讨新环境下信息安全管理范式的转型,对于中国实施网络强国战略、国家大数据战略、国家安全战略以及推动全球信息安全治理体制变革完善,都具有重要的理论意义和实践价值。[方法/过程] 对全球数据驱动的发展趋势进行分析,对大数据时代信息安全的规模、泛在、跨域、综合、隐性等五大特点进行归纳阐述,对基于大数据时代的中国信息安全管理范式转型和全球治理体制变革分别进行多维度的研究论述。[结果/结论] 大数据时代的信息安全正在形成新特点,中国的信息安全管理范式需要创新转型,形成新模式、新路径和新政策;全球的治理体制变革需要用"共"的价值观来推进、尊重并维护信息主权、建立反恐情报共享合作机制。  相似文献   

4.
Librarians are the custodians of library materials. University libraries have a large number of materials in their collections; these collections have different challenges to maintain their existence and utilization. Security and protection of these resources is a difficult task. Book theft or loss is a phenomenon naturally associated with libraries and librarians. This article is an attempt to provide an overview of existing conditions of theft and loss of library material and to describe a major initiative that has been taken to overcome the situation. This study was designed with survey methodology and circulated to library professionals at 172 university and degree awarding institutions. There were 94 responses (54.65%) received. The study revealed that librarians faced objections from auditors and sometimes paid a penalty for stolen or lost books. The theft and loss of materials are examined critically by university management, library committees, and internal and external auditors. Some library professionals are required to pay from their own pockets for stolen and lost material. However, a few librarians write off library books as per Pakistan's Higher Education Commission (HEC) rule. Research highlighted that most libraries have not used technology such as RFID, 3M, or EM Tags for the security of books. An effective technological book security system minimizes loss and provides relief for librarians from audit issues and financial penalties.  相似文献   

5.
毕琳 《图书情报工作》2012,56(5):143-144
对《数字图书馆信息安全管理》一书的主要内容进行评价,认为该书在深入对比分析一系列国际信息安全管理标准和规范的基础上,将在企业和政府机构广泛应用的ISO27000系列标准引入到数字图书馆信息安全管理领域,并从理论和实践上构建数字图书馆信息安全管理的理论体系和实践防范体系,对于认识和推动数字图书馆信息安全的研究与实践具有重要的指导意义。
  相似文献   

6.
通过对瑞典、英国、法国、德国和俄罗斯等欧洲国家与我国政府信息公开保密审查制度在协调信息公开法与保密法关系、界定例外信息范围、规范保密审查流程和完善救济制度等方面进行比较分析, 借鉴域外经验, 提出我国政府信息公开保密审查制度的完善对策:提升政府信息公开立法层次, 制定政府信息公开法;制定个人信息保护法, 保护个人隐私;采用列举方式界定例外信息范围, 有效限制自由裁量权;运用要素检测方法, 区分处理例外信息;设立独立第三方专门机构, 处理信息公开与保密之间的纠纷.  相似文献   

7.
电子政务信息安全风险分析与防范策略   总被引:10,自引:0,他引:10  
我国电子政务信息安全风险主要存在于观念、技术、管理和法律方面。要强化电子政务环境下公务员的信息安全意识 ,建立电子政务信息安全管理机构 ,完善信息安全基础设施和扶持国有信息安全产业的发展。参考文献 13。  相似文献   

8.
信息安全标准已成为国际网络空间竞争的前沿和焦点,国际组织和世界各国政府均在加紧相关问题研究。文章围绕信息安全标准,分析了国内外信息安全标准的研制现状,研究了云计算安全标准和工业控制系统信息安全标准的研制进展,从而为国内信息安全标准的推进提供借鉴。  相似文献   

9.
Information protection is of paramount importance in today's world. From information involving the highest level of government administration and national security, to information existing at the level of the private company in the form of trade secrets or personal data, all are under the constant threat of being compromised. In this study, the researchers attempt to evaluate the information security maturity level and provide clear thoughtful analysis of the information security landscapes of the Malaysian Public Service (MPS) organizations. This study uses convenience sampling and the required data collected from 970 targeted individuals through a self-administrated survey. In addition, a survey questionnaire is utilized to gauge the security landscape and to further understand the occurrence of incidents, the sources of attack, and the types of technical safeguard. Findings revealed that the highest security incidents experienced by the MPS were spamming (42%), followed by attacks of malicious codes (41%). Twenty-five percent of incidents originated from within the organizations, 15% originated from outside, and 11% were from a mixture of internal and external sources. Also, it shows that 49% of incidents were from sources unknown to the respondents. The top most deployed safeguards by the MPS were found to be firewalls (95%), followed by anti-virus software (92%), and access control to information system (89%). Findings on the maturity level show that 61% of respondents are at Level 3, followed by 21% at Level 2 where the information security processes are still considered an Information and Communication Technology (ICT) domain. At the higher end of the continuum lies 13% for Level 4 and 1% at Level 5.  相似文献   

10.
[目的/意义]信息安全是学术信息资源云存储的重要影响因素,有效的信息安全保障架构和防控措施可以为云存储服务商改进其存储服务提供建议,也可以为用户选择云存储服务平台提供参考。[方法/过程]在对学术信息资源云存储进行安全需求分析的基础上,构建学术信息资源云存储安全部署架构和安全运行架构,并从应用安全保障、内容安全保障、数据安全保障、虚拟化安全保障、基础设施安全保障5个方面对学术信息资源云存储安全防控措施进行研究。其中,应用安全保障包括用户身份认证、用户身份管理、访问控制、应用程序和接口安全4个方面;内容安全保障包括内容安全检测、内容安全控制2个方面;数据安全保障包括数据加密、数据完整性验证、数据确定性删除、数据容灾备份与恢复、数据迁移5个方面;虚拟化安全保障包括安全域隔离、用户数据隔离、多租户管理3个方面;基础设施安全保障包括云存储设施安全、物理环境安全、网络安全3个方面。[结果/结论]安全部署架构为学术信息资源云存储的安全部署提供参考,安全运行架构揭示学术信息资源云存储的安全保障要素和安全保障流程,安全防控措施为学术信息资源云存储提供安全保障技术策略。  相似文献   

11.
Although a large body of literature has examined the effects of open government from a theoretical perspective, evidence on the empirical effects is still limited. This paper analyses parental response to an open government initiative consisting of the publication on a government website of school inspection reports. As an indicator of school quality, school inspection reports allow parents to make well informed school choices for their children. We employ a unique natural experiment in Belgium where schools are randomly selected for inspection, and online school inspection reports are the first and only source of objective quality data publicly available. This results in exogenous information shocks. Our findings indicate that information about school quality strongly affects school choice. After the publication, inspected schools experience higher enrolments, with effects driven by positively evaluated schools and rural schools. No differentiated response is observed by schools' socioeconomic composition. We interpret these findings as evidence that parents made extensive use of the government website on which school inspection reports were published.  相似文献   

12.
[目的/意义] 初步论述信息安全界理论前沿,论述威胁情报及其相关热点问题,试图引入新的情报概念,开拓情报研究新的领域。[方法/过程] 通过文献调研、内容分析和归纳演绎,梳理出威胁情报的主要特点、基础性技术、实践现状与趋势、重要意义和未来研究方向。[结果/结论] 威胁情报:①将成为情报研究新的热点;②具有应用范围广泛、紧密跟踪和可用于信息安全管理决策的特征;③对国家信息安全管理和国家情报要素研究均具有重要意义;④与其相关的数据管辖与隐私保护、情报共享等问题将成为未来的研究重点。  相似文献   

13.
随着信息化校园、智慧校园建设工作的开展,档案工作也朝着现代化、信息化方向迈进。大数据、云计算等新一代信息技术给档案工作带来便利的同时,也给档案安全管理带来了新的隐患。本文从高校数字档案资源的内容入手,分析了影响高等学校数字档案资源安全的因素,提出大数据时代高校数字档案资源安全防范的策略,为高校数字档案安全建设提供新思路。  相似文献   

14.
We present the first comprehensive audit and comparison of e-government website security in two countries. Australia was selected for its high level of e-government adoption, while Thailand was selected in contrast as a developing nation. Through our audit of 800 pages across 40 websites, we reveal numerous security vulnerabilities suggesting that the high adopters of e-government may not always be providing better protection to their citizens. Alarmingly, the most basic web security measure, the use of Hypertext Transfer Protocol Secure encryption was only used in half of Australian and one-third of Thai sites. Our methodology included content analysis of policies and encryption, followed by security vulnerability testing, to provide the first baseline data on these two countries. Statistical analysis suggests that far from being the benchmark for security, Australian e-government sites do not significantly differ from Thai sites in their vulnerability level. The implications of these findings are examined, and recommendations are made for practice. It is hoped that these insights into the current state of security provide a needed stimulus to focus more on the practical information security aspects of e-government.  相似文献   

15.
安全问题一直是云计算研究的焦点问题。随着云计算的广泛应用,安全问题更为突出。从某种程度上来说安全问题是信任问题的一种体现。文章从图书馆信息服务参与方的角度对这些由安全问题引发的信任问题进行了分析研究,并通过制定服务等级协议(SLA)的条款来保证信息的安全,从而缓解由安全引发的信任问题。  相似文献   

16.
This study assessed the security of the U.S. state e-government sites to identify opportunities for and threats to the sites and their users. The study used a combination of three methods – web content analysis, information security auditing, and computer network security mapping – for data collection and analysis. The findings indicate that most state e-government sites posted privacy and security policy statements; however, only less than half stated clearly what security measures were in action. Second, the information security audit revealed that 98% of the sites secured users' accounts with SSL encryption for data transmission, and the sites' search tools enable public users to search for public information only. Third, although the sites had most of their internet ports filtered or behind firewalls, all of them had their main IP addresses detected and their port 80/tcp open. The study discussed the threats and opportunities and suggested possible solutions for improving e-government security.  相似文献   

17.
[目的/意义]近年来个人云存储服务的技术安全问题屡见不鲜,严重影响了个人云存储服务用户持续使用率。识别和分析使用云存储服务的技术安全风险的关键影响因素,对于个人云存储服务提供商提供安全云存储服务、提高个人云存储服务用户粘性具有重要实践意义。[方法/过程]基于文献调研、专家访谈、云计算安全报告(Gartner)、云计算安全架构与标准(ENISA、CSA、FedRAMP、MTCS),构建个人云存储服务的技术安全风险影响因素指标体系。通过专家问卷调查得出个人云存储服务的技术安全风险评估体系中各影响因素之间的直接影响矩阵,运用Fuzzy-DEMATEL方法对个人云存储服务技术安全风险影响因素的因果关系及重要程度进行分析,揭示个人云存储服务技术安全风险关键影响因素。[结果/结论]个人云存储服务技术安全风险关键影响因素包括:访问控制、服务/账户劫持、软件安全风险、虚拟化漏洞、数据传输安全。最后,依据实证研究结论,为个人云存储服务提供商构建安全云存储服务提供可行的技术建议。本研究丰富了个人云存储服务安全风险理论研究成果,为个人云存储服务提供商保障用户数据安全提供实践参考。  相似文献   

18.
关于信息管理专业中的信息安全教育问题   总被引:1,自引:0,他引:1  
褚峻 《图书情报工作》2003,47(5):112-115,47
在分析信息安全人才的需求和教育培养体系问题的基础上,指出应该在信息管理专业中进行应用型信息安全人才的培养,阐述开设信息安全课程的必要性和可行性,以及如何开展信息安全教育的问题。最后讨论开展信息安全教育应着力解决的几个实际问题。  相似文献   

19.
[目的/意义]数据治理是实现大数据驱动公共安全治理模式变革的基础,构建体现领域特殊性与敏感性的公共安全数据治理体系为开展科学研究与治理实践提供理论框架指导。[方法/过程]从交叉学科视角出发,对公共安全数据治理的概念进行溯源,并剖析其发展的学科理论基础和驱动力;在此基础上解析代表性文献,梳理公共安全数据治理的解决问题、治理主体、客体、工具和目标五个关键要素的内容范畴与核心内涵,进而构建涵盖多要素、不同维度的数据治理体系逻辑框架。[结果/结论]该框架以数据流为连接点凸显学科之间的知识交叉融合,统筹各关键要素并指出公共安全数据治理的关键议题包括应用情境搭建、数据资源体系建设、主体决策机制建设以及治理工具选择。  相似文献   

20.
电子政务信息资源开发利用的安全保障   总被引:2,自引:0,他引:2  
安全保障是电子政务信息资源开发利用的重要前提条件。本文从制定法律政策、构建政府信息安全体系、加强个人信息保护等三个方面,论述了做好安全保护工作的措施。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号