Please wait a minute...
Computer & Telecommunication  2015, Vol. 1 Issue (4): 74-76    DOI:
Current Issue | Archive | Adv Search |
Study on the Control of Modern Enterprise Information Security Ri
Zhang Zheng
China Mobile Group Guangdong Co.
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Informatization construction is an important focal point of the modern enterprise development, while the problem of information security risk weakens the important role of information technology. From the hacker attack, the internal control management, application system security and other aspects, this article analyzes the information security risk in modern enterprises, and on this basis, expounds the control strategy. This paper aims to strengthen the understanding of enterprise information security risk, and provide certain references for enterprise to construct the information security system, deepening the informationzation construction of modern enterprises.
Key wordsmodern enterprise      information security      risk control      strategy     
Published: 01 January 1900

Cite this article:

Zhang Zheng. Study on the Control of Modern Enterprise Information Security Ri. Computer & Telecommunication, 2015, 1(4): 74-76.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2015/V1/I4/74

[1] FANG Jun QIU Hua. Research on the Solution of Soft Credit Control Strategy for Message Billing Project[J]. 电脑与电信, 2021, 1(8): 52-57.
[2] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[3] KUANG Hui. Research on Information Security of Computer Network in 5G Communication Era[J]. 电脑与电信, 2020, 1(8): 33-.
[4] LIU Jie. Research on Service Route Strategy andAlgorithm of ROADM Network[J]. 电脑与电信, 2020, 1(8): 41-44.
[5] . Construction Strategy of Online Gold Course Based on MOOC Technology[J]. 电脑与电信, 2020, 1(5): 7-8.
[6] WU Jing ZHANG Chenjingzi. Research on the Strategy of K12 Teachers’ Distance Training Based on Mobile Phone Live Broadcast[J]. 电脑与电信, 2019, 1(3): 20-25.
[7] ChenWenyao. IDC Security Construction Strategy for Telecom Carriers[J]. 电脑与电信, 2017, 1(9): 27-29.
[8] Wang Ying, Xu Qin. Research on HeterogeneousWireless Network Selection Strategy and Cooperative Relay Technology[J]. 电脑与电信, 2017, 1(4): 14-15.
[9] Fan Yueqi. Cloud Storage System Structure Model and Security Policy[J]. 电脑与电信, 2017, 1(4): 34-35.
[10] ZHANG Shi-jun. Research on the EarlyWarning and Control System of Information Security Incident Based onWebsite[J]. 电脑与电信, 2017, 1(12): 50-52.
[11] YANG Xue-feng. Exploration and Practice of Optical Network Course Development Based onWork Process Systematization[J]. 电脑与电信, 2017, 1(11): 71-73.
[12] Zhao Xiaomeng, Zhou Junjie. Management System of Mobile Payment Based on Short-range Visible Light Communication[J]. 电脑与电信, 2017, 1(10): 10-13.
[13] Bai Yu. Analysis on Network Security and Information Encryption Technology[J]. 电脑与电信, 2016, 1(8): 53-54.
[14] Xu Haidong. Research and Suggestion on Data Privacy Protection in Cloud Computing[J]. 电脑与电信, 2016, 1(8): 112-113.
[15] Lai Jinzhi. Research on Information Security Protection System of Campus Network in Higher Vocational Colleges[J]. 电脑与电信, 2016, 1(7): 65-67.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd