Cargando…

Legal Management of Network Information Security Based on Embedded Real-Time Task Processing

Nowadays, with the continuous advancement of globalization, Internet technology has made an unprecedented leap, which makes the amount of data on the Internet grow exponentially. Data are not only diverse and numerous, but also spread fast and of high value. Therefore, the Internet is entering the e...

Descripción completa

Detalles Bibliográficos
Autor principal: Bai, Heju
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9481333/
https://www.ncbi.nlm.nih.gov/pubmed/36120679
http://dx.doi.org/10.1155/2022/2379274
Descripción
Sumario:Nowadays, with the continuous advancement of globalization, Internet technology has made an unprecedented leap, which makes the amount of data on the Internet grow exponentially. Data are not only diverse and numerous, but also spread fast and of high value. Therefore, the Internet is entering the era of big data. However, the openness of information network itself, the immaturity of technology, and the imperfection of network security law make it vulnerable to network attacks, resulting in the disclosure of network users' information and the theft of their privacy data. The formulation of network information security law to protect network information security is of great significance for the development of multidomain network information security under the background of big data and ensuring users' online security. Firstly, this article introduces the basic information of embedded real-time task system, analyzes the factors of real-time Linux based on kernel preemption, interrupts mechanism and policy planning, and summarizes the process of some embedded real-time task processing. Integrating legal management, this article puts forward three elements of network security control mechanism, namely, network control personnel, environment, and technology. Taking these three elements as the starting point of the construction of information security control mechanism, this article provides the steps of using evaluation model to evaluate network information security. Finally, it identifies the problems existing in the legal management of network information security and formulates the corresponding strategies. By combining embedded technology and real-time task processing technology, this study applies it to the field of network information security legal management, to promote its development.