Security of marine-information system

Security of marine-information system

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Security and Privacy for Big Data, Cloud Computing and Applications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This chapter starts from the security demand of marine-information system to emphatically introduce the main problems in the marine-information system, including wireless-communication security, secure sharing of information, big data security and military-civilian coordination, centers on the marine information security system to discuss the technology and method of guaranteeing the security of marine-information system from the aspects of communication network security, computing environment security, data and application security, security monitoring and forewarning and security support. In addition, it lays emphasis on analyzing and introducing the required key theories and technologies of the network space security for marine-information-system design.

Chapter Contents:

  • 6.1 Background and significance of marine information security
  • 6.2 The characteristics and design objective of marine-information system
  • 6.3 Marine information security risk analysis
  • 6.4 Analysis on marine-information system security demand
  • 6.4.1 Wireless network communication security
  • 6.4.2 Marine data security
  • 6.4.3 Marine-information-sharing security
  • 6.4.4 Marine-information-systematization security
  • 6.5 Marine information security system
  • 6.5.1 Marine communication and network security
  • 6.5.2 Marine system computing environment security
  • 6.5.3 Big marine data and application security
  • 6.5.4 Marine-information-sharing security
  • 6.5.5 Marine security monitoring and forewarning mechanism
  • 6.5.6 Marine security infrastructure
  • 6.6 Key security theory and technology
  • 6.6.1 Password and security protocol
  • Foundations of cryptography
  • Concept and function of cryptographic protocol
  • 6.6.2 Intrusion detection
  • Main functions and components of IDS
  • Classification of intrusion-detection technology
  • 6.6.3 Data backup and recovery technology
  • Introduction to data backup and recovery
  • Classification of data-backup system
  • Data backup and data-recovery strategy
  • 6.7 Marine information security development trend and discussion
  • References

Inspec keywords: Big Data; security of data

Other keywords: security demand; wireless-communication security; security monitoring; network space security; marine-information-system design; marine information security system; application security; communication network security; big data security; environment security

Subjects: Data security; Radio links and equipment; Other DBMS

Preview this chapter:
Zoom in

Security of marine-information system, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc028e/PBPC028E_ch6-1.gif /docserver/preview/fulltext/books/pc/pbpc028e/PBPC028E_ch6-2.gif

Related content

This is a required field
Please enter a valid email address