ABSTRACT
Internet is an emerging technology industry worldwide. With the continuous development of computer technology, although the Internet can provide convenience for people, its security problems are gradually highlighted and are receiving more and more attention. Cyber security issues not only affect personal information, but also endanger national information security. At the same time, in the cyber environment, viruses often threaten the operation of software. There are a number of security risks. How to use software design to enhance virus defense is also a hot issue of current research. Therefore, this paper takes the cybersecurity threat characteristics of software in the big data environment as the basic basis and proposes a software design framework based on cybersecurity system to improve software security in the cyber environment so as to ensure internal data security.
- Ziyuan Zhao, Hongwei Xing. Design of network security monitoring system of power monitoring system based on big data. China Energy and Environmental Protection, 44 (01), pp.242-247+255, 2022.Google Scholar
- Lingmei Song. The application of virtual network technology in computer network security. Science & Technology for China's Mass Media, 00(02), pp.105-107, 2021.Google Scholar
- Wanghong Zhou. Big data technology application in network security analysis. Electronics World, 00(17), pp.108-109, 2020.Google Scholar
- Ziyang Zhang. Thinking about the application of big data technology in cybersecurity practice. China New Telecommunications, 22(13), pp.152, 2020.Google Scholar
- Lei Zou, Quanling Mu. Reliability evaluation of wireless communication network security system based on pattern recognition technology. Microelectronics & Computer, 37 (06), pp.79-82, 2020.Google Scholar
- Chen Xia. Exploring the design of defense system for linked network security system. Network Security Technology & Application, 00(02), pp.13-15, 2020.Google Scholar
- Qiang Shan. Research on the development of network security system based on software engineering technology. Computer Products and Distribution, 00(02), pp.17+271, 2019.Google Scholar
- Yu Sun. Introduction to the application of big data technology in network security analysis. Network Security Technology & Application, 00(04), pp.102+106, 2017.Google Scholar
- Yao Wang. Design and implementation of enterprise information network security system. China Computer & Communication, 00(06), pp.119-120, 2017.Google Scholar
- Miao Zhu. Research on the design and implementation of campus network security system based on honeynet technology. Management & Technology of SME, 00(11), pp.163-164, 2016.Google Scholar
Index Terms
- Software Development and Design of a Cybersecurity System Based on Big Data Analysis Technology
Recommendations
Design of an IoT DDoS attack prediction system based on data mining technology
AbstractDue to the rise of the Internet of things (IoT), the threat to information security extends from general servers to IoT devices. Possible IoT security issues include all kinds of network attacks. Distributed denial-of-service (DDoS) attacks are ...
Software development: what it is, what it should be, and how to get there
Developing large software systems is notoriously difficult and unpredictable. Software projects are often canceled, finish late and over budget, or yield low quality results --- setting software engineering apart from established engineering ...
Comments