Abstract
The purpose of this paper is to analyze the “external” and “internal” security challenges of Internet financial enterprises, to study information security risks and protection strategies, which will help to grasp the security pain points and inspire Internet financial enterprises to carry out information security construction. In this paper, H Internet financial enterprises as a practical case, through the combination of theory and information security risk assessment, information security status and shortcomings, derived information security optimization protection strategy. Through the analysis of real cases, combining the ISMS information security management system and data security capability maturity model (CMM) theory, obtained the big data security protection strategy suggestion: should first start from meet the requirements of national laws and regulations policy, by constructing a more reasonable data security organization, perfecting and implementing targeted landing process, the data security system deployment utility and relatively effective tool of data safety technology, strengthen the personnel safety awareness and safety operation skill level, to improve through five aspects and improvement, can effectively improve the Internet financial enterprises large data information security protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gao, Y., Sun, J., Zhou, Q.: Forward looking versus backward looking: an empirical study on the effectiveness of credit evaluation system in china’s online P2P lending market. China Finan. Rev. Int. 7(2), 228–248 (2017)
Wakeling, V., Robertson, P.R.: A comparison of student behavior and performance between an instructor-regulated versus student-regulated online undergraduate finance course. Am. J. Educ. Res. 5(58), 863–870 (2017)
Il Chung, H., Duncombe, W., Yinger, J.: The impact of state aid reform on property values: a case study of maryland’s bridge to excellence in public schools act. Educ. Finan. Policy 13(1), 1–46 (2017)
Bishop, L.: Using every pixel to visualize big data - O’reilly media free, live events. Arch. Biochem. Biophys. 327(1), 53–60 (2017)
Sabar, N.R., Abawajy, J., Yearwood, J.: Heterogeneous cooperative co-evolution memetic differential evolution algorithm for Big Data optimization problems. IEEE Trans. Evol. Comput. 21(2), 315–327 (2017)
Pecaric, M., Boutis, K., Beckstead, J.: A Big Data and learning analytics approach to process-level feedback in cognitive simulations. Acad. Med. Philadelphia 92(2), 175 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Hu, S., Huang, M. (2021). Internet Financial Security Based on Big Data. In: Abawajy, J., Choo, KK., Xu, Z., Atiquzzaman, M. (eds) 2020 International Conference on Applications and Techniques in Cyber Intelligence. ATCI 2020. Advances in Intelligent Systems and Computing, vol 1244. Springer, Cham. https://doi.org/10.1007/978-3-030-53980-1_72
Download citation
DOI: https://doi.org/10.1007/978-3-030-53980-1_72
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-53979-5
Online ISBN: 978-3-030-53980-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)