Research on Architecture and Key Technology of Information Security Emergency Response

Author(s):  
Yongjun Peng ◽  
Zili Zou ◽  
Xi Guo ◽  
Jinming Chen ◽  
Min Yang
2014 ◽  
Vol 926-930 ◽  
pp. 2151-2154
Author(s):  
Jin Hai Lu

Along with the development of the computer technology, communication technology and information security, people are enjoying the convenience of new trade patterns e-commerce bring by open web. At the same time, it also have to face all kinds of security problems in e-commerce. In this paper, it analyzed the network security technology in electronic commerce, put forward the design scheme of network security platform that can effectively ensure the smooth progress of e-commerce activities. The study of the security problems in e-commerce, has special important theory value and practical significance.


2014 ◽  
Vol 701-702 ◽  
pp. 947-951
Author(s):  
Ran Yu ◽  
Jiao Jiao Zhang ◽  
Hong Fei Xu ◽  
Shen Jin

An integrated electricity information security monitoring platform is presented, electrical information security integrated real-time monitoring of the state power applied information security systems, security equipment, network equipment, network boundaries, desktop computers, to improve information security monitoring, early warning, emergency response and defense capabilities to protect IT hardware, software and network security, which can guarantee continuous, reliable and efficient operation.


Author(s):  
Dan Harnesk ◽  
Heidi Hartikainen

This paper draws on the socio-technical research tradition in information systems to re-conceptualize the information security in emergency response. A conceptual basis encompassing the three layers—technical, cognitive, and organizational—is developed by synthesizing Actor Network Theory and Theory of Organizational Routines. This paper makes the assumption that the emergency response context is built on the relationship between association and connectivity, which continuously shapes the emergency action network and its routines. Empirically, the analysis is based on a single case study conducted across three emergency departments. The data thus collected on information security, emergency department routines, and emergency actions is used to theorize specifically on the association/connectivity relationship. The resultant findings point to the fact that information security layers have a meaning in emergency response that is different from mainstream definitions of information security.


2014 ◽  
Vol 1049-1050 ◽  
pp. 2054-2058
Author(s):  
Wei Liu ◽  
Jun Lin

The firmware is an indispensable basic system in computer systems. With the increase of BIOS chip capacity and module functions, the hidden security problems of BIOS are also more and more. But there is no BIOS production capacity in Chinese mainland currently. The whole information security system has not really established completely. In the circumstances of computer widespread using in the government, institutions, commercial, schools and so on, how to ensure and monitor the security of BIOS system has important significance to ensure overall control of information security in China. This paper proposes the design and implementation methods for BIOS security testing procedures and testing system through the analysis of BIOS security, and provides a new way of thinking for BIOS security.


Author(s):  
Dan Harnesk ◽  
Heidi Hartikainen

This paper draws on the socio-technical research tradition in information systems to re-conceptualize the information security in emergency response. A conceptual basis encompassing the three layers—technical, cognitive, and organizational—is developed by synthesizing Actor Network Theory and Theory of Organizational Routines. This paper makes the assumption that the emergency response context is built on the relationship between association and connectivity, which continuously shapes the emergency action network and its routines. Empirically, the analysis is based on a single case study conducted across three emergency departments. The data thus collected on information security, emergency department routines, and emergency actions is used to theorize specifically on the association/connectivity relationship. The resultant findings point to the fact that information security layers have a meaning in emergency response that is different from mainstream definitions of information security.


Sign in / Sign up

Export Citation Format

Share Document