信息安全研究 ›› 2021, Vol. 7 ›› Issue (2): 178-183.

• 技术应用 • 上一篇    下一篇

等保2.0下的移动警务数据安全技术应用探究

王传合1,赵利军2   

  1. 1. 陕西铁路工程职业技术学院
    2. 陕西省渭南市公安局网安支队
  • 收稿日期:2021-02-09 出版日期:2021-02-05 发布日期:2021-02-09
  • 通讯作者: 王传合
  • 作者简介:王传合 研究生学历,网络工程师,陕西铁路工程职业技术学院信息化与网络安全处处长,从事信息化建设工作15年.主要研究方向为职业教育信息化建设和信息化应用. wanwill@qq.com 赵利军 高级工程师(副高级),渭南市公安局网络安全保卫支队政委,警务技术一级主管,主要研究方向为网络安全综合治理、网络安全等级保护. 375835913@qq.com

Research on the Application of Mobile Police Data Security Technology in the Implementation of Classified Protection 2.0

  • Received:2021-02-09 Online:2021-02-05 Published:2021-02-09

摘要: 移动警务是当前公安信息系统智能化建设的重大部署.随着等保2.0的到来,对数据安全,尤其是敏感数据的保护提到了相当重要的位置.由于移动警务业务通常需要接入公安网、移动设备多样化等因素,使得移动警务中数据安全面临更加严峻的威胁.基于《信息安全技术 网络安全等级保护基本要求》(等保2.0)的角度分析了移动警务建设中面临的数据安全风险,包括移动端与服务端的通信安全风险、移动端存储及传输数据的安全风险、移动端剩余数据安全风险、个人信息安全风险等.最后,针对数据安全风险,结合数据签名、数据加密、身份认证、数据防恢复、数据匿名、数据备份等多种技术阐述了数据安全的保护措施,为等保2.0下移动警务建设中的数据安全提供了理论依据.

关键词: 等保2.0, 移动警务, 数据安全, 数据匿名, 数据备份

Abstract: Mobile police is an important deployment of intelligent construction of public security information system. With the advent of classified protection 2.0, data security, especially the protection of sensitive data, has been raised to a very important position. Due to the mobile police usually needs access to the public security network and the diversification of mobile devices, the data security of mobile police is facing more serious threats. Based on the perspective of " Information Security Technology- Baseline for Cybersecurity Classified Protection "(classified protection 2.0), this paper analyzes the data security risks in the construction of mobile police, including the communication security risks between mobile terminal and server, the storage and transmission data security risks of mobile terminal, the remaining data security risks of mobile terminal, and the personal information security risks, etc. Finally, aiming at the risk of data security, combined with data signature, data encryption, identity authentication, data recovery prevention, data anonymity, data backup and other technologies, this paper expounds the protection measures of data security, so as to provide a theoretical basis for data security in mobile police construction under classified protection 2.0.

Key words: classified protection 2.0, mobile police, data security, data anonymity, data backup