Enterprise Information Security Management Using Internet of Things Combined with Artificial Intelligence Technology
Table 2
The role of each module.
Serial number
Name
Composition
Effect
1
Perception layer
Wireless sensor
It is a part of the bottom layer, which controls physical security and is used to ensure the integrity of IoT information collection data and not be destroyed or stolen.
2
Information collection layer
Information collector
Its information security needs to be managed to prevent the data collection process from being used and controlled, and the technology of the perception layer is encrypted with key management and chip design.
3
Information transmission security layer
Hard disk
Data transmission ensures the smooth collection of data and cooperates with security management technologies, such as wireless network security, routing security, firewall, and virtual network technology.
4
Information processing layer
Hard disk
It is to ensure the security of information processing and storage. It is composed of cloud storage and security management. Its technologies include analysis of security data, viruses, monitoring data, and data mining results.