With the accelerated construction of new infrastructure such as 5G networks, big data centers, and industrial Internet, new infrastructure will become one of the important means to stimulate consumption and ensure economic development. But at the same time, new infrastructure also brings new challenges to my country's network security, and the security capabilities of related enterprises face great urgency and challenges.
The reporter recently learned from interviews that with the advent of the new infrastructure wave, large security companies, industry alliances and forum platforms have organized relevant department heads, experts and scholars, and company executives to jointly interpret the new opportunities, new responsibilities and new connotations of the new infrastructure. The security challenges and response strategies derived from this trend have become a top priority. The Cybersecurity Review Measures provide guidance for new infrastructure construction Data shows that my country's digital economy is developing rapidly, currently accounting for about 35% of GDP and totaling more than 30 trillion yuan. The development of the digital economy includes two aspects: digital industrialization and industrial digitization. "In the future, the new infrastructure, which will make a significant contribution to the development of the digital economy and has a scale of tens of trillions of yuan, actually often includes the integration of digital industrialization and industrial digitization." Ni Guangnan, an academician of the Chinese Academy of Engineering, said in an interview with reporters. He said that as a new field, the important keyword of new infrastructure is network security, and network security is a prerequisite for the construction of new infrastructure. The "Network Security Review Measures" (hereinafter referred to as the "Measures") jointly issued by 12 departments recently determined the correct direction for the new infrastructure to ensure network security. The "Measures" clearly state that if the procurement of network products and services by operators of critical information infrastructure affects or may affect national security, they shall conduct network security reviews in accordance with these Measures. Ni Guangnan said that since autonomy and controllability are necessary conditions for network security, the "autonomy and controllability evaluation" that has been implemented and achieved results in relevant fields recently can be used as a reference for the "Measures" and provide assistance for the implementation of the "Measures". In order to ensure autonomy and controllability in important areas, relevant departments have implemented multi-dimensional evaluations of core technology products, including autonomy and controllability evaluations, that is, in addition to the "quality evaluation" and "security evaluation" that have been implemented in the past, "autonomy and controllability evaluation" has also been added. Autonomy and controllability require the formulation of objective and scientific evaluation standards, and the evaluation shall be carried out by a third-party organization; in important occasions related to network security, autonomy and controllability evaluation can play a "veto" role. Build a strong security line with active immune trusted computing At the "Alliance Cybersecurity and Informatization New Infrastructure Special Seminar" recently held by the Zhongguancun Cybersecurity and Informatization Industry Alliance, Shen Changxiang, an academician of the Chinese Academy of Engineering, delivered a keynote speech on "Building a New Infrastructure Network Security Protection System with Active Immune Trusted Computing". The reporter noted that the written materials of Shen Changxiang's speech said that as a national economic development strategy, the new infrastructure is showing strong momentum, focusing on the transformation of new and old momentum, and helping modern high-quality urban construction to reach new heights. However, it also poses severe challenges to network security. For example, the ransomware virus has swept the network system for several years, causing huge losses. The new infrastructure is centered on data and networks, and its development premise is to build a solid security line with active immune trusted computing. Active immune trusted computing is a new computing model that performs security protection while performing operations. It uses passwords as genetic antibodies to implement identity recognition, state measurement, confidentiality storage and other functions, and timely identify "self" and "non-self" components, thereby destroying and rejecting harmful substances entering the body, which is equivalent to cultivating immunity for network information systems. Trust in human-computer interaction is the source and prerequisite for the kinetic energy of new infrastructure such as 5G and data centers. The four elements of human operation access strategy (subject, object, operation, environment) must be trusted, identified and controlled. Therefore, only by strengthening the management services of security trust and passwords can the five links of infrastructure be trusted: architecture trust, resource allocation trust, policy management trust, data storage trust and operation behavior trust. Shen Changxiang proposed that the new infrastructure must establish a new system framework in order to adopt a new computing model, and implement a triple active immune defense framework of computing environment, regional boundaries and communication network supported by security management, so as to achieve the security protection effect of attackers being unable to enter, unauthorized persons being unable to obtain important information, stealing confidential information and not being able to understand it, computing resources being unable to be changed, system operation being unable to be paralyzed, and attacks being unable to be denied. The entire process must be measurable and controllable, not be interfered with, safety hazards eliminated, and the calculation results must be consistent with expectations. Relevant enterprises need to take multiple measures to build their security capabilities Experts pointed out that the development of new infrastructure will lead to a rapid growth in network access devices and data volume, which puts higher demands on vulnerability security protection and the construction of network security assurance systems. At a live forum titled "Vulnerability Security View under the Tide of New Infrastructure" hosted by Green Network Technology, Liu Wenmao, director of the Chinese Computer Society and head of Green Network Technology's Nebula Laboratory, said that under the new infrastructure environment, artificial intelligence and automation will be able to achieve intelligent decision-making and response in large-scale distributed scenarios in the future, which will also be an important supporting technology for the security of new infrastructure. The industry believes that the virtualization of 5G networks and cloud data centers blurs the physical boundaries of the network, and the extensive use of open source software and over-reliance on third-party open source basic libraries in the AI field increase the risk of introducing security vulnerabilities. In this regard, Li Jing, director of the enterprise security management product line of Green Alliance Technology, said that to do a good job in vulnerability management, we must first consider security pre-work, clarify the management scope, set corresponding roles and functional requirements according to the scope, select the right assessment tools, and refine the corresponding policies and service level agreements according to the scope, so that the subsequent vulnerability management process can be smoother. Li Jing said that in the process of vulnerability management, the fragmentation and segmentation management of vulnerabilities based on risk levels can efficiently and quickly repair vulnerabilities and reduce risks. The cloud vulnerability response automation that turns passive into active can achieve rapid response to sudden security vulnerabilities through the integration and integration of existing development and operation and maintenance tools, shortening the time window for enterprises to be threatened by security threats from weeks and months to hours. In the "Saining Talks about the Shooting Range" program produced by Saining Network Security, Wang Xu, deputy general manager of Saining Network Security, said that strengthening the security capabilities of enterprises has become an important measure for new infrastructure enterprises to deal with external (network) threats and risks. New infrastructure enterprises need stronger and more mature security capabilities to escort the development of the industry. Wang Xu believes that the new infrastructure driven by science and technology is the core area of international technological competition and is also an important battlefield for cybersecurity threats. Although the construction of cybersecurity capabilities in these industries and the training of security personnel have been planned for a long time, facing the opportunities and challenges of new infrastructure, deeper and more mature security capabilities are needed. |
>>: How to Re-evaluate Unified Communications Tools in the Work-from-Home Era
The press conference on the major project "N...
[[325361]] According to foreign media reports, re...
Oluyun is a new Chinese hosting company that open...
The CAN bus was originally designed by Bosch in t...
The tribe has shared G-core product information s...
According to foreign media reports, OPPO, Ericsso...
1. Definition of fast charging [[343166]] There i...
Recently, more than 560,000 5G users in South Kor...
On February 8, according to data released by GSA,...
In today's interconnected world, achieving su...
Mr. Dongguo and the wolf, Lu Dongbin and the dog,...
Since 5G is still in the development and deployme...
Foreword: According to the "Statistical Repo...
On November 10, the Ministry of Industry and Info...
A recent investigation by reporters found that in...