2021 white paper on data security and personal information protection technology From Refining stone

The following is the 2021 white paper on data security and personal information protection technology From Refining stone recommended by recordtrend.com. And this article belongs to the classification: research report, network security.
At present, the new economy represented by digital economy has become a new engine of economic growth, data as a core factor of production has become a basic strategic resource, and the basic guarantee role of data security has become increasingly prominent. The accompanying data security risks are increasing day by day, and data leakage, data abuse and other security incidents occur frequently, which has brought serious security risks to personal privacy, enterprise trade secrets, national important data and so on. In recent years, the state has carried out forward-looking strategic deployment for data security and personal information protection, and carried out systematic top-level design. The data security law of the people’s Republic of China came into force on September 1st, 2021, and the personal information protection law of the people’s Republic of China came into force on November 1st, 2021.
This white paper (or this report) is prepared under the background of the successive implementation of the data security law, the personal information protection law and other laws. The data security law aims to safeguard national security and social public interests and ensure data security. Its definition of “data” refers to any record of information by electronic or other means. The personal information protection law focuses more on personal rights and interests in order to safeguard the privacy, personality, personal, property and other interests of citizens. Its definition of “personal information” refers to all kinds of information related to identified or identifiable natural persons recorded electronically or in other ways, excluding anonymous information.
The understanding of the relationship between “data” and “information” in the industry can be roughly divided into three categories: first, “information” belongs to the sub concept of “data”, and “information” is the useful content extracted from the collected “data”; Second, “information” and “data” are mixed with each other, and the conceptual distinction has no substantive significance; Third, “data” belongs to the sub concept of “information”, which only represents the manifestation of “information” in the electronic communication environment. This report is based on the first interpretation of the relationship between data and information, that is, “personal information” belongs to the sub concept of “data”. At the same time, when dealing with personal information, the data processor in the data security law is also the personal information processor in the personal information protection law. In addition to complying with the data security law, he must also comply with the personal information protection law. From the technical level, personal information often exists in the form of structured data or unstructured data. The protection means of protecting personal information and protecting data are highly common. Considering the above reasons, this report combines data security technology and personal information protection technology.
This report comprehensively combs the challenges and opportunities faced by the current development of data security, analyzes the security risks and responses associated with each link of business flow in combination with real data leakage events, and explores the “new framework” and “new tactics” of data security. Referring to the classic network security framework att&ck, this report proposes a new data security technology framework dttack (data centric tactics, technology and general knowledge), with a view to combining the two frameworks to achieve “both attack and defense, network and data integration”. This report introduces the dttack framework in detail, and explains the corresponding tactics and technologies in terms of data security from seven aspects: identification (I), protection (P), detection (d), response (R), recovery (R), reaction (c) and Governance (g), covering the security protection of the whole life cycle of data (collection, storage, use, processing, transmission, provision, disclosure, etc.). Finally, the report briefly expounds the application example scheme of data security from ten scenarios, such as cloud platform, industrial Internet, government big data, banking and finance, civil aviation industry, for reference.
“If you want to do good things, you must first use your tools”. Under the background of the rapid development of the digital economy, we need to deeply understand the importance of data security construction. We not only need to improve the safety awareness and management level, but also need to focus on the layout and innovation in technology. We hope this report can provide reference and reference for the data security construction of enterprises or institutions. Due to the limited level of editors, errors in the report are inevitable. Readers are invited to correct them. Colleagues in the industry are also welcome to participate in the improvement and provide assistance for the development of the industry!
If you want to get the full report, you can contact us by leaving us the comment. If you think the information here might be helpful to others, please actively share it. If you want others to see your attitude towards this report, please actively comment and discuss it. Please stay tuned to us, we will keep updating as much as possible to record future development trends.
RecordTrend.com is a website that focuses on future technologies, markets and user trends. We are responsible for collecting the latest research data, authority data, industry research and analysis reports. We are committed to becoming a data and report sharing platform for professionals and decision makers. We look forward to working with you to record the development trends of today’s economy, technology, industrial chain and business model.Welcome to follow, comment and bookmark us, and hope to share the future with you, and look forward to your success with our help.