The Application of Big Data and Artificial Intelligence Technology in Enterprise Information Security Management and Risk Assessment

The Application of Big Data and Artificial Intelligence Technology in Enterprise Information Security Management and Risk Assessment

Qi Wang (School of Management, Hefei University of Technology, China & Faculty of Mathematics and Statistics, Suzhou University, China), Bangfeng Zong (School of Mechanical and Electronic Engineering, Suzhou University, China), Yong Lin (Faculty of Mathematics and Statistics, Suzhou University, China), Zhuangzhuang Li (Faculty of Mathematics and Statistics, Suzhou University, China), and Xv Luo (Suzhou Bangcai Education Technology Co., Ltd., China)
Copyright: © 2023 |Pages: 15
DOI: 10.4018/JOEUC.326934
Article PDF Download
Open access articles are freely available for download

Abstract

With the development of digitalization and Internet technology, enterprise information security is facing more and more challenges. Many enterprises have begun to adopt big data (BD) and artificial intelligence (AI) technology for risk assessment (RA) and prediction to effectively manage information security risks. This article discusses the application of BD and AI technology in enterprise information security management (ISM) and RA from two aspects. Firstly, the mobile payment signature scheme based on number theory research unit is used to improve the security of the mobile payment system. This scheme uses lattice algorithms to achieve fast key generation, signing, and verification and can resist traditional cryptographic attacks. Secondly, a set of enterprise ISM and RA system is established, including risk identification, RA, monitoring and early warning, emergency response, and other links. BD and AI technology is used to analyze internal and external data to provide accurate RA results to achieve automated RA.
Article Preview
Top

Introduction

Research Background and Significance

With the development of enterprise application information technology, information security faces more challenges. Traditional security technologies and methods can no longer meet the growing needs of enterprises, so it is necessary to introduce new technical means for information security management (ISM) and risk assessment (RA). As an emerging technology field, big data (BD) and artificial intelligence (AI) technologies have powerful data processing and analysis capabilities, which can help enterprises achieve accurate and efficient RA and prediction (Dai, 2022; Meng et al., 2022). Especially in the hot development of new payment methods, such as mobile payment, how to ensure information security in the payment process has become an urgent problem to be solved. Based on this, this paper aims to discuss the application of BD and AI technologies in enterprise ISM and RA, aiming to provide new solutions to help enterprises ensure information security (Lei et al., 2022; Ye & Chen, 2021).

The application of BD and AI technologies in enterprise ISM and RA is significant (Wang & Dai, 2022). First, the accuracy and precision of RA can be improved. BD and AI technologies can conduct in-depth analysis and mining of massive data to help enterprises identify potential risks and provide accurate RA results. Second, risk monitoring and early warning can be strengthened. BD and AI technologies can realize the monitoring and analysis of network traffic and abnormal behavior to detect and respond to potential risks. Third, it can help enterprises develop a scientific security strategy. Through the analysis and mining of BD and AI technologies, enterprises can understand their information security status to provide a basis for formulating scientific and effective security strategies. Finally, it can improve the efficiency and effectiveness of security management. BD and AI technologies can realize automated RA and prediction, reduce the burden of security management, and improve management efficiency and effectiveness.

Based on this, this paper analyzes the specific steps of the mobile payment signature scheme based on the Number Theory Research Unit (NTRU) lattice, compares its superiority with the traditional mobile payment signature scheme, constructs the enterprise ISM and RA systems, and evaluates the system dynamically and in real time through the system performance evaluation index system. The innovation point of the research is to use the mobile payment signature scheme based on the digital signature scheme to improve the security of the mobile payment system and establish a set of enterprise ISM and RA systems, including risk identification, RA, monitoring and early warning, emergency response, and other links. This paper proposes a new solution for applying BD and AI technologies in enterprise ISM and RA, which has significant theoretical and practical value.

Research Objective

The main objective of this paper is to discuss the application of BD and AI technologies in enterprise ISM and RA, aiming to provide new solutions for enterprises to help enterprises protect information security. Specifically, the objectives include:

  • 1.

    Research and analyze BD and AI technologies' application status and trends in enterprise ISM and RA.

  • 2.

    Explore a mobile payment signature scheme based on the NTRU lattice to improve the security of mobile payment systems and conduct relevant experimental verification.

  • 3.

    Establish a set of enterprise ISM and RA systems, including risk identification, RA, monitoring and early warning, and emergency response, and use BD and AI technologies to analyze internal and external data of the enterprise to achieve automated RA.

  • 4.

    Verify the feasibility and effectiveness of the proposed methods and schemes and evaluate their application effects, advantages, and disadvantages.

Through the above research, the application and applicability of BD and AI technologies in enterprise ISM and RA can be deeply understood to provide scientific and reasonable ISM and RA solutions for enterprises and improve enterprise information security.

Complete Article List

Search this Journal:
Reset
Volume 37: 1 Issue (2025)
Volume 36: 1 Issue (2024)
Volume 35: 3 Issues (2023)
Volume 34: 10 Issues (2022)
Volume 33: 6 Issues (2021)
Volume 32: 4 Issues (2020)
Volume 31: 4 Issues (2019)
Volume 30: 4 Issues (2018)
Volume 29: 4 Issues (2017)
Volume 28: 4 Issues (2016)
Volume 27: 4 Issues (2015)
Volume 26: 4 Issues (2014)
Volume 25: 4 Issues (2013)
Volume 24: 4 Issues (2012)
Volume 23: 4 Issues (2011)
Volume 22: 4 Issues (2010)
Volume 21: 4 Issues (2009)
Volume 20: 4 Issues (2008)
Volume 19: 4 Issues (2007)
Volume 18: 4 Issues (2006)
Volume 17: 4 Issues (2005)
Volume 16: 4 Issues (2004)
Volume 15: 4 Issues (2003)
Volume 14: 4 Issues (2002)
Volume 13: 4 Issues (2001)
Volume 12: 4 Issues (2000)
Volume 11: 4 Issues (1999)
Volume 10: 4 Issues (1998)
Volume 9: 4 Issues (1997)
Volume 8: 4 Issues (1996)
Volume 7: 4 Issues (1995)
Volume 6: 4 Issues (1994)
Volume 5: 4 Issues (1993)
Volume 4: 4 Issues (1992)
Volume 3: 4 Issues (1991)
Volume 2: 4 Issues (1990)
Volume 1: 3 Issues (1989)
View Complete Journal Contents Listing