New infrastructure accelerates digital transformation and network security requires the principle of "three non-dependence"

New infrastructure accelerates digital transformation and network security requires the principle of "three non-dependence"

Since the beginning of this year, as the real economy has accelerated its digital transformation and upgrading, the Chinese economy has demonstrated resilience and potential during this special period, and "new infrastructure" has become the focus of economic development. Under the tide of "new infrastructure", the importance and urgency of network security construction are becoming increasingly prominent. While all walks of life are accelerating digital upgrades, more complex and systematic requirements are being put forward for network security.

[[324563]]

Specifically, with the development of 5G, big data, artificial intelligence, industrial Internet and other technology applications, customers including governments and enterprises need not only single products and technologies, as well as emergency response from a single expert, but also scenario-based and integrated products and services, as well as a security defense system that can cope with complex needs when deploying network security. Only in this way can we ensure that the customer's digital environment can operate safely and smoothly.

Take the Beijing Winter Olympics, which chose Qi'anxin as its cybersecurity sponsor for the first time, as an example. This project fully demonstrates the complexity, integrity and systematization of the cybersecurity needs of large-scale projects. According to Han Yonggang, vice president of Qi'anxin, the Olympic Games is a very complex network with dozens or even hundreds of connected systems. Once a single system has a problem, hackers can control the entire network through the vulnerability. Therefore, to protect the cybersecurity of the 2022 Beijing Winter Olympics, it is necessary to form an airtight cybersecurity system to address threats and challenges in various scenarios.

In response to the network security needs of the Beijing Winter Olympics, a large-scale project, Han Yonggang, vice president of Qi'anxin, said that we have put forward the principle of "three non-dependence": no reliance on a single technology, no reliance on the ability of individual experts, and no reliance on a single-dimensional intelligence source. "Three non-dependence" is a systematic idea that must be supported by powerful platform technology and capabilities that can adapt to needs.

Therefore, Qi'anxin tailored a unique network security protection service system for the Beijing Winter Olympics - the "Six-dimensional Network Security Protection System", which includes full-dimensional control, full network protection, all-weather operation, full-field coverage, full-service coordination, and full-line closed loop. On the one hand, it is necessary to connect with all the IT systems of the Olympic Games suppliers one by one to ensure endogenous security; on the other hand, it is necessary to sort out the Olympic Games' competition process, venues, and traffic, and at the same time provide basic network security knowledge training for personnel, so that every staff member and volunteer can become a guardian of network security and form a complete system of collective prevention and control.

Analysts believe that the era of relying on a single product and technology to protect network security has long passed. Qi'anxin supports the effective operation of the security defense system of institutions by exporting productized and scenario-based service products to government and enterprise institutions. Such output does not rely on a single technology, the ability of individual experts, or a single-dimensional intelligence source, that is, it follows the principle of "three non-dependencies" and can only operate effectively through the transformation of "single-point technology + platformization + organizational structure".

<<:  Three considerations to spark innovation on the modern web

>>:  Wi-Fi 5 is out! Wi-Fi 6 advantages: faster speed/more power efficient

Recommend

Will 5G kill Wi-Fi? The father of wireless data calls it a joke

With the official release of 5G commercial photog...

TCP Things 1: TCP Protocol, Algorithm and Principle

TCP is a very complex protocol because it has to ...

The story of spectrum: from analog signals to 3G and now to 5G networks

Preface: From telegraph to 5G communication, it i...

RackNerd Los Angeles DC02 restock, VPS promotion starts at $9.89 per year

Earlier this month, we shared a summary of RackNe...

CloudCone: $9.5/year-512MB/30GB/3TB@1Gbps/Los Angeles data center

Updated again, CloudCone's Christmas promotio...

As containers become more widely used, how should we monitor them?

With the booming development and implementation o...