IBM data this locality changes plan, aid force to cross state-owend enterprise course of study to achieve the data security that carries end

IBM data this locality changes plan, aid force to cross state-owend enterprise course of study to achieve the data security that carries end

[introduction] in recent years, the swift and violent development that accompanying big data reachs the ChatGPT progress that makes type AI, the abidance that digitlizes a technology upgrades to bring a lot of advantage for us, also caused at the same time ” data flies all over the sky ” , aggravate of data safety hidden danger, incident frequency sends data security. The enterprise that cross a state changes development in Chinese this locality, building the data security system that accords with laws and regulations of Chinese data safety is important, necessary this locality changes one of strategy, IBM data this locality changes plan, the data that can help implementation of the enterprise that cross a state carry end is safe.

21.jpg

Article author: Liu Xuesong,

IBM seeks advice from data of big China area and artificial intelligence transition to seek advice from service copartner

Abroad the individual data of 50 million user divulges some famous and gregarious platform, illegal instrument of some travel platform of custom-built advertisement, home gathers information of individual of abuse of platform of engine of foreign some search the happening of a series of incident such as user information, bring tremendous safe influence to society, individual, also cause the pecuniary loss that is as high as billions of dollar to relevant enterprise.

Data security becomes the topic for discussion that the public pays close attention to increasingly, the country also is perfected ceaselessly in legal level, advance data security to manage thereby. Since 2016, chinese government with ” network safety law ” , ” data safety law ” , ” individual information protects a law ” wait for data legislation to be a foundation, came on stage in succession ” data leaves the country safety evaluates method ” , ” regulation of network data security (ask for an opinion to stalk of grain) ” , ” industry and security of informatization domain data run way (try out) ” wait for regulation of form a complete set and administrative measure.

22.jpg

IBM helps the enterprise that cross a state build end to run a system to upright data security

In recent years, IBM helps many transnational corporation build data this locality to change safety management system and technical system in China, make the data group that accords with native land requirement, valve of avoid data safety controls a venture, this locality of quick implementation data changes construction. Be based on the experience that will in data security construct a field for years to accumulate, IBM proposal transnational corporation undertakes in Chinese churchyard chemical industry of data this locality is made when, below Ying Congru 4 paces begin relevant work:

1, safety is evaluated, scanty and do not leak

Data security is evaluated include data safety administration is evaluated and data security technology is evaluated, among them data safety administration evaluates consciousness of security of data of the relevant system technological process that includes data security to supervise security of organization, data, faculty etc, data security technology is evaluated include data to distributing, security of compose of roll-over protective structure, data defends etc, assessment data limits includes to deposit the business data in the database, analysis data to wait not only, still include paper file, image to wait. Security of IBM proposal data is evaluated should collect in data, data is transmitted, complete lifecycle process undertakes the data such as destroy by melting or burning of switch of data storage, data processing, data, data be analysed in the round, accomplish scanty and do not leak, give out finally comprehensive, real data security is evaluated, for follow-up data security the job provides a basis.

2, build Zhang Li to make, standard management

Building effective safe organization and safeguard system is crucial. Want to establish data security to run an organization above all, authority of manage Qing Dynasty is belonged to. The reasonable constituent design in data safety administration, but the policy system that be born implements is the base that data security runs the job to whether succeed. Data security manages an organization to suggest to differentiate for 3 administrative levels, among them decision-making layer is held the position of by the senior controller of the company, the security of great and decision-making, data of responsible data security organizes establish, the setting of core personnel; Administrative layer basically is in charge of driving what security of data of company departmental door works to begin, coordinate each interest; Executive layer basically carries out each specific data security to supervise the work. Have the aid of manages a framework at data security three-layer, the movement that makes data security working from above to below, harmonious rises, achieve the goal that data security manages finally. It is to build perfect safety to run the system such as system, flow, method, pattern plate next, the be born with superintendency data politic security carries out a circumstance, supervise and urge of data safety administration and technical issue rectify and reform, safeguard data security works to be begun effectively.

3, classification classifications, formulate strategy

Data classification classifications is data closes compasses most the problem of core, data classification classifications is the premise that data security manages. Undertake be classifieded effectively classificationing to data only, make in the light of different data different safety and share strategy, ability avoids data safety valve to accuse ” the control way that one knife cuts ” , more careful measure is adopted on data safety administration, make data is in share use and safety is used between achieve a balance. The origin that data classification is according to data, content and utility undertake classified to data, the sensitive degree that data classifications is the value according to data, content, influence and distribute limits to differ to undertake to data sensitive level differentiates. Data is classified and classificationing is to concern early or late, classify first classification again, classification is more from business angle, classification more sets out from safe angle, classification is transverse, classificationing is depth.

23.jpg

4, be born is carried out, promote continuously

The be born of data security includes to organize establish, of policy fulfil, the safe strategy of data complete lifecycle is carried out. Because the demand for service of the enterprise changes ceaselessly as market environment, because this data is safe,administrative strategy and technical measure also are in upgrade ceaselessly, construction of data security capability is not get sth done once and for ever, those who accomplish in one move. Technology of security of data of IBM of have the aid of, combine AI algorithm cheek by jowl, monitor actively sensitive, closed circuit of implementation data security runs ability, achieve security of data complete lifecycle truly thereby.

IBM changes the successful practice of as safe as data domain in data this locality

IBM provides security of analysis of data security current situation, data through be business client the end such as executive be born of program of security of design of system of management of safety of risk identifying, data and technical system design, data serves to the safety of end, help client implementation closes legally compasses knowable, classification classifications but knowledge, use flow can accuse, data risk but examine, canal accuses promotion to see 5 old ends.

With some company of the consumable that cross a state begins routine of melt into of data this locality in China, IBM manages the current situation to diagnose from data security set out, security of the data that finish runs blue print design and executive course program, final help client built perfect data safety valve to control a system, include to build the class system such as data security; Standard of standard of monitoring of design data security, user safety grading and safe lash-up beforehand case, comb business and the business data that in running a course, involve, undertake sensitive data identifies reach safe influence to evaluate; Build data security classification to manage by different levels system, flow of metric model, lash-up is controlled related, ensure knowable ” of data security ” , ” can know ” , ” to be able to accuse ” , ” but examine ” , ” visible ” , implementation carries upright data security.

Draft source: The United States tells a company

Avoid duty statement: The article is reprint an article, reprint this article purpose to depend on passing more information, the person that copyright puts in original work ‘s charge is all. If involve work copyright issue,article place uses video, picture, written language, contact please small make up undertake handling.

Leave a Reply

Your email address will not be published. Required fields are marked *