Research On Service Mode of Information Security in Post-construction Era
Abstract
Based on information security service and its characteristics in the development of information technology, author
comprehensively analyzes the current situation and development tendency of the industry. This paper puts forward the business mode of
the information security operation, and analyzes its model composition, construction process and diffi culties that faced in this process. This
article can provide certain model reference and theoretical support for the innovation and sustainable development in this business.
comprehensively analyzes the current situation and development tendency of the industry. This paper puts forward the business mode of
the information security operation, and analyzes its model composition, construction process and diffi culties that faced in this process. This
article can provide certain model reference and theoretical support for the innovation and sustainable development in this business.
Keywords
Information security, Safe operation, Information security consulting, Advisory service
Full Text:
PDFReferences
[1] Michael Pang. Cybersecurity Law: Multiple level Protection Scheme
[2] Harry Katzan . Cybersecurity Service Model
[3] Huawei Technologies Co., Ltd .Huawei’s Position Paper on Cyber Security
[4]Yamin Wang .Suggestions on Implementation of Railway Information Security Classifi cation Protection
[5] Yukai Wang. The development of network security and informatization has entered a new historical stage
DOI: https://doi.org/10.18686/esta.v10i2.388
Refbacks
- There are currently no refbacks.
Copyright (c) 2023 Qiyao Tang,Yadong Tang