| With the rapid development of network and communication technology,especially the gradual maturity of new technologies such as cloud computing,the Internet of Things,and the industrial Internet,information security has been promoted to the height of national security strategy and is an important part of national security.Our leaders have always paid attention to the development of information security.As early as 2014,General Secretary Xi Jinping clearly pointed out that "Without network security,there would be no national security,and without informatization,there would be no modernization".With the concept of "digital economy" entering ordinary people’s homes,most enterprises are catching up with the dividends brought by the era of digital economy in full swing by taking advantage of the east wind of enterprise digital transformation.The digital transformation of enterprises cannot be separated from information security,and enterprises pay more and more attention to information security.With the promulgation of laws and regulations such as the Network Security Law and the Basic Requirements for Cybersecurity Classified Protection,enterprises have to consider the requirements of information security compliance in the business process.If the enterprise information security incident is disclosed by the media,it will not only affect the reputation of the enterprise and lose the accumulated customers for many years,but also bring huge economic fines and legal penalties to the enterprise.HC Home Appliance Manufacturing Group,as an old traditional manufacturing industry,conforms to the trend of the times and actively transforms to the direction of enterprise digitalization.Under the historical background of the arrival of the era of big data,the information security of enterprises is also facing new opportunities and challenges.The information security management system established by HC Group has been in operation for many years,but the information security incidents that occur every year always remind the existence of security risks.How to optimize the information security management system has become an urgent problem for HC Group.This paper first uses the literature research method,referring to the latest research results of the information security management system at home and abroad,and taking the ISO/ICE27001 standard,PDCA Cycle Theory,Cybersecurity Classified Protection Standard,etc.as the theoretical basis,through security evaluation,expert interviews,field research and other methods to investigate and study the information security management system of HC Home Appliance Manufacturing Group,Find out the gap between the control areas of information security management and the ISO27001 standard and Cybersecurity Classified Protection Standard,reveal the existing problems of the information security management system in risk assessment,organizational control,personnel control,physical control,technical control,and API security under the big data environment,and analyze and summarize the reasons for the problems of the information security management system.Secondly,in view of the problems of the information security management system investigated,the optimization scheme design is proposed from the aspects of risk assessment,organizational control,personnel control,physical control,technical control,and API security risk in the big data environment to achieve the goal of optimizing the information security management system.Finally,in order to ensure the effective implementation of the information security management system optimization plan,this paper proposes security measures from the aspects of information security system,organization and talent,technology,capital,audit supervision,assessment,high-level support,etc.The purpose of this study is to optimize the information security management system of HC Home Appliance Manufacturing Group,solve the current urgent information security needs,and reduce the risk of information asset leakage.At the same time,it is hoped that it will have some practical reference value for the construction of the information security management system in the manufacturing industry. |