{"title":"Design and Implementation of IDC Information Security System Based on Deep Security","authors":"Xiao Yu Li, Qian Bin Chen","doi":"10.1109/ITCA52113.2020.00040","DOIUrl":null,"url":null,"abstract":"Based on the deep security, this paper takes the current situation of IDC business development of domestic telecom operators and the national network information security protection requirements as the background, and takes the new project of IDC information security system in a province as the source of the subject, with three purposes. Firstly, this paper investigates and studies the difficulties of domestic telecom operators in the development of IDC services; secondly, this paper looks for the combination point of IDC business transformation of telecom operators and meets the new requirements of network information security based on deep security; thirdly, taking practical projects as an example, this paper improves the transformation strategy of \"two in one\" in practice.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITCA52113.2020.00040","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Based on the deep security, this paper takes the current situation of IDC business development of domestic telecom operators and the national network information security protection requirements as the background, and takes the new project of IDC information security system in a province as the source of the subject, with three purposes. Firstly, this paper investigates and studies the difficulties of domestic telecom operators in the development of IDC services; secondly, this paper looks for the combination point of IDC business transformation of telecom operators and meets the new requirements of network information security based on deep security; thirdly, taking practical projects as an example, this paper improves the transformation strategy of "two in one" in practice.