Please wait a minute...
Computer & Telecommunication  2015, Vol. 1 Issue (4): 74-76    DOI:
Current Issue | Archive | Adv Search |
Study on the Control of Modern Enterprise Information Security Ri
Zhang Zheng
China Mobile Group Guangdong Co.
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Informatization construction is an important focal point of the modern enterprise development, while the problem of information security risk weakens the important role of information technology. From the hacker attack, the internal control management, application system security and other aspects, this article analyzes the information security risk in modern enterprises, and on this basis, expounds the control strategy. This paper aims to strengthen the understanding of enterprise information security risk, and provide certain references for enterprise to construct the information security system, deepening the informationzation construction of modern enterprises.
Key wordsmodern enterprise      information security      risk control      strategy     
Published: 01 January 1900

Cite this article:

Zhang Zheng. Study on the Control of Modern Enterprise Information Security Ri. Computer & Telecommunication, 2015, 1(4): 74-76.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2015/V1/I4/74

[1] WANG Xiao-nan . Investigation and Research of AIGC Products Applied in Higher Education Field from the Perspective of College Students[J]. 电脑与电信, 2024, 1(5): 19-.
[2] GUO Xu-kun. Research on the Development Situation and Coordination Strategy of Multi Department Data Sharing of Digital Government in Guangdong - Hong Kong - Macao Greater Bay Area[J]. 电脑与电信, 2024, 1(5): 47-.
[3] SHAO Ze-jun  DAI Bing  HU You-ming  YIN Jun-han  LIU Yue-chao. Research on the Autonomous and Controllable Maturity of Provincial Enterprise Data Centers: Take Shandong Province for Example[J]. 电脑与电信, 2024, 1(5): 103-.
[4] LI Jing ZHAO Ming-chao.
Application and Research of Classroom Response System in Instructional Design
——Take Ottawa University for Example
[J]. 电脑与电信, 2022, 1(9): 4-9.
[5] ZHOUChaoLIUYun-peng.
Connotation,FrameandPromotionofDigitalLiteracyofHigherVocationalSchoolStudents
undertheBackgroundofDigitalChinaConstruction
[J]. 电脑与电信, 2022, 1(12): 6-.
[6] FANG Jun QIU Hua. Research on the Solution of Soft Credit Control Strategy for Message Billing Project[J]. 电脑与电信, 2021, 1(8): 52-57.
[7] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[8] TONG Wei HUANG Qi-ping.
Optimization Strategy of Privacy-oriented BRNN Protection
[J]. 电脑与电信, 2021, 1(12): 58-61.
[9] KUANG Hui. Research on Information Security of Computer Network in 5G Communication Era[J]. 电脑与电信, 2020, 1(8): 33-.
[10] LIU Jie. Research on Service Route Strategy andAlgorithm of ROADM Network[J]. 电脑与电信, 2020, 1(8): 41-44.
[11] . Construction Strategy of Online Gold Course Based on MOOC Technology[J]. 电脑与电信, 2020, 1(5): 7-8.
[12] WU Jing ZHANG Chenjingzi. Research on the Strategy of K12 Teachers’ Distance Training Based on Mobile Phone Live Broadcast[J]. 电脑与电信, 2019, 1(3): 20-25.
[13] ChenWenyao. IDC Security Construction Strategy for Telecom Carriers[J]. 电脑与电信, 2017, 1(9): 27-29.
[14] Wang Ying, Xu Qin. Research on HeterogeneousWireless Network Selection Strategy and Cooperative Relay Technology[J]. 电脑与电信, 2017, 1(4): 14-15.
[15] Fan Yueqi. Cloud Storage System Structure Model and Security Policy[J]. 电脑与电信, 2017, 1(4): 34-35.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd