Research On Service Mode of Information Security in Post-construction Era

Qiyao Tang, Yadong Tang

Abstract


Based on information security service and its characteristics in the development of information technology, author
comprehensively analyzes the current situation and development tendency of the industry. This paper puts forward the business mode of
the information security operation, and analyzes its model composition, construction process and diffi culties that faced in this process. This
article can provide certain model reference and theoretical support for the innovation and sustainable development in this business.

Keywords


Information security, Safe operation, Information security consulting, Advisory service

Full Text:

PDF

Included Database


References


[1] Michael Pang. Cybersecurity Law: Multiple level Protection Scheme

[2] Harry Katzan . Cybersecurity Service Model

[3] Huawei Technologies Co., Ltd .Huawei’s Position Paper on Cyber Security

[4]Yamin Wang .Suggestions on Implementation of Railway Information Security Classifi cation Protection

[5] Yukai Wang. The development of network security and informatization has entered a new historical stage




DOI: https://doi.org/10.18686/esta.v10i2.388

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Qiyao Tang,Yadong Tang