网络与信息安全学报 ›› 2019, Vol. 5 ›› Issue (4): 71-79.doi: 10.11959/j.issn.2096-109x.2019044

• 学术论文 • 上一篇    下一篇

金融科技中数据安全的挑战与对策

朱建明,杨鸿瑞()   

  1. 中央财经大学信息学院,北京 102206
  • 修回日期:2019-08-02 出版日期:2019-08-15 发布日期:2019-08-20
  • 作者简介:朱建明(1965- ),男,山西太原人,博士,中央财经大学教授、博士生导师,主要研究方向为信息安全、金融科技与区块链技术。|杨鸿瑞(1998- ),男,北京人,主要研究方向为计算机科学与技术。
  • 基金资助:
    国家重点研发计划基金资助项目(2017YFB1400700)

Data security challenges and countermeasures in financial technology

Jianming ZHU,Hongrui YANG()   

  1. School of Information,Central University of Finance and Economics,Beijing 102206,China
  • Revised:2019-08-02 Online:2019-08-15 Published:2019-08-20
  • Supported by:
    The National Key R&D Program of China(2017YFB1400700)

摘要:

金融科技为金融业带来机遇的同时带来了新的挑战,金融业务数字化、网络化、智能化引发的数据爆发式增长,对数据安全治理提出了更高的要求。因此,在对金融科技发展现状及其金融数据安全分析的基础上,针对金融数据特点,提出了金融数据安全“果壳”模型:其内部是确保数据保密性、完整性、可用性的安全目标;外部是可能存在的数据被泄露、篡改、破坏等各种威胁;中间是各种应对策略,包括访问策略、防控策略、检测或感知策略等。以此模型为基础,对金融科技中的数据安全治理提出了相关建议和对策。

关键词: 金融科技, 大数据, 数据安全, 数据治理, 安全模型

Abstract:

While financial technology brings opportunities to the financial industry,it also brings new challenges.With the rapid development of financial technology,the big data explosion caused by the digitalization,networking and intelligence of financial services has put forward new and greater requirements for data security governance.Based on the analysis of the status quo of financial technology development and financial data security,a financial data security “shell” model for the characteristics of financial data was proposed:the internal is the security goals of ensuring data confidentiality,integrity,and availability; the external is a variety of threats including data leaking,tampering and destroying etc; the middle is various coping strategies,including access strategies,prevention and control strategies,detection strategies,perceived strategies and etc.According to this model,relevant suggestions and countermeasures for data security governance in financial technology are proposed.

Key words: financial technology, big data, data security, data governance, security model

中图分类号: 

No Suggested Reading articles found!