Cargando…

Legal Management of Network Information Security Based on Embedded Real-Time Task Processing

Nowadays, with the continuous advancement of globalization, Internet technology has made an unprecedented leap, which makes the amount of data on the Internet grow exponentially. Data are not only diverse and numerous, but also spread fast and of high value. Therefore, the Internet is entering the e...

Descripción completa

Detalles Bibliográficos
Autor principal: Bai, Heju
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9481333/
https://www.ncbi.nlm.nih.gov/pubmed/36120679
http://dx.doi.org/10.1155/2022/2379274
_version_ 1784791241675767808
author Bai, Heju
author_facet Bai, Heju
author_sort Bai, Heju
collection PubMed
description Nowadays, with the continuous advancement of globalization, Internet technology has made an unprecedented leap, which makes the amount of data on the Internet grow exponentially. Data are not only diverse and numerous, but also spread fast and of high value. Therefore, the Internet is entering the era of big data. However, the openness of information network itself, the immaturity of technology, and the imperfection of network security law make it vulnerable to network attacks, resulting in the disclosure of network users' information and the theft of their privacy data. The formulation of network information security law to protect network information security is of great significance for the development of multidomain network information security under the background of big data and ensuring users' online security. Firstly, this article introduces the basic information of embedded real-time task system, analyzes the factors of real-time Linux based on kernel preemption, interrupts mechanism and policy planning, and summarizes the process of some embedded real-time task processing. Integrating legal management, this article puts forward three elements of network security control mechanism, namely, network control personnel, environment, and technology. Taking these three elements as the starting point of the construction of information security control mechanism, this article provides the steps of using evaluation model to evaluate network information security. Finally, it identifies the problems existing in the legal management of network information security and formulates the corresponding strategies. By combining embedded technology and real-time task processing technology, this study applies it to the field of network information security legal management, to promote its development.
format Online
Article
Text
id pubmed-9481333
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Hindawi
record_format MEDLINE/PubMed
spelling pubmed-94813332022-09-17 Legal Management of Network Information Security Based on Embedded Real-Time Task Processing Bai, Heju Comput Intell Neurosci Research Article Nowadays, with the continuous advancement of globalization, Internet technology has made an unprecedented leap, which makes the amount of data on the Internet grow exponentially. Data are not only diverse and numerous, but also spread fast and of high value. Therefore, the Internet is entering the era of big data. However, the openness of information network itself, the immaturity of technology, and the imperfection of network security law make it vulnerable to network attacks, resulting in the disclosure of network users' information and the theft of their privacy data. The formulation of network information security law to protect network information security is of great significance for the development of multidomain network information security under the background of big data and ensuring users' online security. Firstly, this article introduces the basic information of embedded real-time task system, analyzes the factors of real-time Linux based on kernel preemption, interrupts mechanism and policy planning, and summarizes the process of some embedded real-time task processing. Integrating legal management, this article puts forward three elements of network security control mechanism, namely, network control personnel, environment, and technology. Taking these three elements as the starting point of the construction of information security control mechanism, this article provides the steps of using evaluation model to evaluate network information security. Finally, it identifies the problems existing in the legal management of network information security and formulates the corresponding strategies. By combining embedded technology and real-time task processing technology, this study applies it to the field of network information security legal management, to promote its development. Hindawi 2022-09-09 /pmc/articles/PMC9481333/ /pubmed/36120679 http://dx.doi.org/10.1155/2022/2379274 Text en Copyright © 2022 Heju Bai. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Bai, Heju
Legal Management of Network Information Security Based on Embedded Real-Time Task Processing
title Legal Management of Network Information Security Based on Embedded Real-Time Task Processing
title_full Legal Management of Network Information Security Based on Embedded Real-Time Task Processing
title_fullStr Legal Management of Network Information Security Based on Embedded Real-Time Task Processing
title_full_unstemmed Legal Management of Network Information Security Based on Embedded Real-Time Task Processing
title_short Legal Management of Network Information Security Based on Embedded Real-Time Task Processing
title_sort legal management of network information security based on embedded real-time task processing
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9481333/
https://www.ncbi.nlm.nih.gov/pubmed/36120679
http://dx.doi.org/10.1155/2022/2379274
work_keys_str_mv AT baiheju legalmanagementofnetworkinformationsecuritybasedonembeddedrealtimetaskprocessing