Shandong University Big Data Security Final Exam Recall Edition (2022.6.6)

Shandong University Big Data Security Final Exam Recall Edition (2022.6.6 Shang Jianwei)

1. Analyze the life cycle of big data and the security requirements of each cycle. What big data security technologies can prevent these hidden dangers to achieve the goal of big data security.

2. The concept and model of autonomous access control technology. The advantages and disadvantages of this technology for big data security applications.

3. The concept of role mining based on hierarchical clustering. Use agglomerative role mining to draw the permission cluster tree or permission cluster table of the following graph

image-20220606121207572

4. Compare and analyze the advantages and disadvantages of symmetric encryption and public key encryption. What are their applications in big data security?

5. The idea of ​​RSA encryption, and the process of key generation and encryption/decryption.

6. The concept and function of message authentication code. And the use process of HASH-based message authentication code.

7. There are n existing documents, and a security indexing technology is designed for these n documents. (Big Data Security Index)

Guess you like

Origin blog.csdn.net/qq_50861917/article/details/125144353