"Shell" integration of high-quality capital Garlica, Chenguo Chunfeng, Lintai Biological three M&A listed successfully
2023-07-07Sichuan Product Promotion Association: In-depth member enterprises to solve problems
2023-07-07[Editor's note:] Performing all kinds of changes in the network domain, practicing a hundred battles of elite soldiers, is the military field of "Zhu Rihe" mode, fused to the network of the construction of a strong country to explore the practice.Comrade Cheng Lin, executive director of the China Law Society, president of the Police Law Research Society, former party secretary and president of the People's Public Security University of China (PPSU), and researcher, combining his teaching reflections at the PPSU as well as practical explorations in other important positions, has guided the establishment of a cybersecurity "Zhuzhihe" base in Chengdu's Wuhou District, along with the Qin'an Institute of Strategic Studies. "base in Wuhou District, Chengdu.More than a year, the base to take an innovative model, and the Sichuan Provincial Public Security Bureau of network security and defense units, such as the General Unit, the establishment of a good working relationship, and gradually landing network security "Zhu Rihe" base of the "nine platforms" function: training platform, display platform, Query platform, display platform, testing platform, exchange platform, innovation platform, entrepreneurship platform, publicity platform, service platform, for the construction of a strong network into a high-quality new stage of development and dedication.
This article is another important article after President Cheng Lin actively constructed the comprehensive base for training and innovation of network security "Zhu Rihe", which integrates the "new infrastructure" and network security "Zhu Rihe". This article is another important article after President Cheng Lin actively constructed the "Zhu Rihe" training and innovation base for network security, which integrates the "new infrastructure" and the "Zhu Rihe" for network security into a whole, and reflects on the important issue of strengthening the network security infrastructure in the context of the "new infrastructure", and provides a strong theoretical support for the construction of network power to enter into a new development stage.
Seizing the opportunity of new infrastructure to strengthen cybersecurity infrastructures
Cheng Lin, President, China Police Law Research Society
Network security is closely related to national security, economic and social development and people's work, study and life, etc. The new infrastructure and network security are closely intertwined, and the new infrastructure can not be separated from network security, and great importance must be attached to the network security of the new infrastructure. Network security at present there are two main aspects of the problem: one is the technical security problem, and the other is the management security problem. The core of network security to protect the new infrastructure is the security of network infrastructure facilities and data and information, to protect the security of the new infrastructure network system should not only rely on network security technology, but also strengthen the security management, the establishment of laws and regulations, and adhere to the rule of law, adhere to the technical security + management security "two-wheel drive" to protect network security.
I. Address the relationship between cybersecurity and new infrastructure.
With the rapid development of new technologies such as the Internet, big data, cloud computing, Internet of Things, 5G, mobile Internet and artificial intelligence, which will certainly have a profound impact on and change the governance of human society, economic development, social concepts, social psychology and behavior, etc. In order to adapt to the rapid development of science and technology, to strengthen the supply-side reform, and to promote the enhancement of the high-tech content of the economic and social development, the state made a strategic plan to strengthen the new infrastructure. On March 6, 2020, the Ministry of Industry and Information Technology (MIIT) announced that the new infrastructure mainly includes the following seven major areas: 5G base station construction, new energy vehicle charging piles, big data centers, artificial intelligence, industrial internet, extra-high-voltage power grids, inter-city high-speed railroads and inter-city rail transit.The main elements of the new infrastructure related to cybersecurity are:Network planning, wireless main equipment and transmission equipment, terminal equipment, etc. in the construction of 5G base stations; storage and processing of information and data in the construction of big data centers, etc.; underlying hardware, general AI technology and platform in the construction of the artificial intelligence industry chain, the key to the two processes of computation and processing and information perception, the core of the chip and algorithms, etc.; industrial control system in the construction of the industrial Internet, the key to data and information flow , storage, analysis and processing, communication is the foundation, etc.; network data information center in the construction of extra-high voltage power grid, etc.; data and information processing center in the construction of intercity high-speed railroad and intercity rail transit, etc. From the above, it can be seen that the new infrastructure is based on the information network, according to the needs of high-tech and high-quality development, to provide digitalization, informatization, intellectualization, the integration of traditional industries with modern high-tech and innovation of the new infrastructure equipment Facilities system, network infrastructure facilities and data information is the foundation and key, but also to ensure the core of security. Therefore, network security is indispensable to the construction of new infrastructure, and network security and new infrastructure are invisible, intangible and inseparable, just like people can't live without air.
China's cybersecurity exists in the core key technology of the network is subject to the control of the United States and the West, there is a serious security risk problem. The U.S. has recently declared its intention to "
Clean network", slandering our country's use of the Internet to carry out activities such as stealing secrets, which is a blatant cry of thieves catching thieves, the reality is that the United States on the Internet as a manifestation of the whole body of the poor traces of their use of hacking and high technology to carry out cyber-attacks on other countries to collect intelligence, create rumors, damage critical infrastructure, and so on. The United States has long used its communications technology, cyber-technology advantages and cyber-hegemony to conduct global surveillance and monitoring in a pervasive manner, and has been expanding the scope of its surveillance of leaders of other countries and international organizations, civilians and related enterprises, including the former Secretary-General of the United Nations, Ban Ki-moon, and many dignitaries, such as the Chancellor of Germany, Angela Merkel.
On August 7, 2020, the Wall Street Times exposed that a company with ties to the U.S. defense and intelligence community had embedded its software into more than 500 mobile apps, enabling it to track the location information of hundreds of millions of users around the globe and transmit it to the military.A reporter asked our foreign ministry spokesperson on October 13 that, according to the AFP news agency, the "Five Eyes Coalition " joined with Japan and India to demand
Signal, Telegram and other tech companies are "opening back doors" in encrypted applications to provide law enforcement agencies with access to monitor cybercrime. A Foreign Ministry spokesperson replied that member countries of the Five Eyes Coalition have long accused Chinese companies, without any evidence, of installing "backdoors" in their products, threatening the security of supply chains and personal privacy. At the same time, the "Five Eyes Coalition" has no qualms about openly asking enterprises to install "backdoors" in encryption applications, is this not a typical double standard? This fully exposes the hypocrisy of these countries and proves once again that their actions are purely politically motivated, and their real purpose is to suppress enterprises of other countries. "The Five Eyes Coalition is the largest intelligence organization in the world. Now that an intelligence organization has openly requested telecommunication enterprises to install "backdoors" in their products on the ground of combating cybercrime, is its real purpose to combat crime or to collect intelligence? In view of the fact that the United States, as a member of the Five Eyes Coalition, has carried out large-scale and indiscriminate cyber surveillance on a global scale, the international community has reasons to be vigilant about the real intentions of the Five Eyes Coalition.
From the "Snowden Incident", "WikiLeaks" and other exposed cyber security incidents, to "Prism Gate", "Formula", "Echelon System" and other cyber espionage activities; long-term cyber attacks on China, Russia and other countries, the organization "Formula" and "Eye of Sauron". "Prismgate", "Formula", "Echelon System" and other cyber-espionage activities; long-term cyber-attacks on China, Russia and other countries of the organization "Formula" and "Sauron's eye" are backed by the United States. "The United States National Security Agency (NSA) is the backstage of both organizations; from the attack on Venezuela's power grid to the destruction of centrifuges in Iran's nuclear facilities, a large number of facts have proved that the United States is the mastermind of global cybersecurity and a security threat, and that it is mainly because of them that they have contaminated the clean and safe environment of the network.
With the rise of China's Huawei and other enterprises in 5G and other fields, the United States is worried about the impact of their communications network technology hegemony, especially in recent years, the United States of America's implementation of the trade war against our country, ZTE, Huawei, and other companies and some colleges and universities to carry out a full-scale suppression of the implementation of the war of science and technology, as well as the Communist Party of China and China's political system and other stigmatization of China's cybersecurity issues have become more pronounced. At present, we need to guard against the possibility that the United States will jump over the wall and carry out cyberattacks and cyberwarfare against our country.
We should grasp this new historical opportunity of new infrastructure, stand at the height of how to comprehensively strengthen and maintain national network security, bear in mind the spirit of General Secretary Xi Jinping's instruction that "there is no national security without network security", and fully realize that network security infrastructure is an important part of the new infrastructure, and that guaranteeing network security is a fundamental guarantee for the development of new infrastructure. The fundamental guarantee for the construction and development of the new infrastructure is to coordinate the network security and new infrastructure construction, do a good job of top-level planning and design, comb the problems, find the short boards, build the foundation, and actively build a three-dimensional, all-weather network security ecosystem for the new infrastructure.
II. Major difficulties and problems in network security infrastructure.
1.There is a risk that the global Internet applied in our country could be disconnected by the United States.The Internet (formerly known as the Internet) was designed and built by the United States, and the 13 root servers of the Internet are mainly stored in the United States and allied countries, with the right to assign domain names controlled by the United States. There is a risk that the United States Government may cut off our country's connection to the international Internet in the name of maintaining national security according to the needs of its own political or economic interests.
2.The risk of a cut-off in the supply of the technology for blocking the core key hardware equipment used by our country in the field of network information.
The key core technologies used in our network, such as servers, chips and other network infrastructure equipment, rely on the United States and Western countries. The hazards and risks posed to our network infrastructure equipment by the United States' crackdown on high-tech enterprises such as ZTE and Huawei have become very obvious and serious.
3.The security risk of key core software system technologies, such as computer operating systems, being controlled by the United States and its allies.Most of our government departments, enterprise units and personal computers use the windows operating system of the United States Microsoft Corporation; many of the encryptions used are mainly open source passwords provided by Android, and there are very few independently innovated passwords in China; the foreign media and "WikiLeaks" and "Snowden" have exposed that some software provided by the United States enterprises intentionally leave "backdoors"; the United States Government has stipulated that the software system vulnerabilities discovered by the United States Internet enterprises themselves should be provided to the intelligence departments of the United States Government and the military as a priority. "and other exposure of some U.S. enterprises to provide software intentionally leave a" backdoor "; the U.S. government regulations of the U.S. Internet companies found their own software system vulnerabilities should be given priority to provide the U.S. government's intelligence departments and the military and other use, and not allowed to make up for the vulnerability, and so on, and other organizations or individuals to find out before they can be released to the outside world. They use these "back doors" and loopholes to attack and sabotage our country and other countries, steal data and information, create rumors, sow discord between the Party and the government and the people, and deliberately create social unrest.
4.The basic legal system for governing cybersecurity in accordance with the law is still not sound and complete.The network society and the real society are closely intertwined, 5G and other new network technologies, new applications and so on continue to emerge, the popularization and application of the mobile Internet, to the new infrastructure will bring more and more serious cybersecurity risks, how to legally manage the network society and the real society are intertwined with the security risks arising from the network, and weave firmly and tightly the net of the net of the rule of law, and there are many of the legal and institutional system needs to be constantly There are still many laws and systems that need to be established, revised and improved. Managing the network security of new infrastructures in accordance with the law is a very important basic task that needs to be solved urgently.
III. Actively building a security environment system that synchronizes and resonates with the new infrastructure for network security infrastructure construction
The rapid development of the Internet and the implementation of China's new infrastructure strategy will certainly have a significant impact on and profound changes in China's economy, social construction and development, as well as on people's learning, work, life and ways of thinking and behaving, etc. The United States' comprehensive suppression of China's high-technology development has led to the implementation of China's new infrastructure strategy and the safeguarding of cybersecurity, which are facing new and even more severe pressures and challenges. In the face of such difficulties and challenges, we should bear in mind the instructions of General Secretary Xi Jinping: crisis coexists, there are opportunities in crisis, and crisis can be turned into opportunities. We have to find and seize opportunities in the new infrastructure, resolve crises and risk challenges, and carry out the new pattern of development that is dominated by the domestic macrocycle and mutually reinforced by the domestic and international double cycle. We should catalyze new development functions with scientific and technological theoretical innovation and original technological innovation, encourage spending great efforts to enhance the independent innovation capability and level of new infrastructure and network security, strengthen theoretical innovation and research on network security, make breakthroughs in and master the key core technologies of network security as soon as possible, promote the wide application of home-made software, system products and other infrastructures, and enhance China's competitiveness in network security, open supervisory capability, risk It will also enhance China's competitiveness in network security, open supervision and risk prevention and control capabilities, and build a three-dimensional, all-weather network security prevention and control ecosystem.
1.Infrastructure such as network security equipment and facilities systems should be incorporated into the new infrastructure.The network society is an important part of the real society. With the rapid development of 5G, the Internet of Things (IoT), artificial intelligence and new infrastructure, the network society and the real society are more closely intertwined. The network society is an open and free society, and the more open it is, the more importance should be attached to security, and the more important it is to deal with the relationship between development and security in an integrated manner. Network security governance is an important part of promoting the modernization of the national governance system and governance capacity, and the governance of the network society should give full play to the advantages of technical security + management security, so as to make the governance of the network society both vibrant and well-ordered, and present the organic unity of vitality and order. Therefore, in the new infrastructure, network security should be placed in the important position of synchronized and equal construction with other seven major fields. Which of the seven major areas of the new infrastructure cannot be separated from the core foundation of how to maintain and safeguard the security of infrastructure equipment and the security of data and information.
To learn from our country in the process of Internet construction and development of heavy construction, light application, ignoring the lessons of security, network security and new infrastructure together with a good top-level design, integrated "planning, design, construction, application, security, management" six as one, synchronization and resonance, from the source to build a new infrastructure and network security ecosystem.
2The new infrastructure is to build a technical protection system for network data information security with passwords as the core.The core of network security maintenance and protection is the security of data and information. Currently taken network security measures are mainly set passwords, firewalls, gateway network gate, access authorization, auditing and other technical methods and measures, mainly in the application layer of the network to do security, from the collection of network data and information, transmission, storage, analysis and processing and other major aspects of the formation of the life cycle analysis, which link is prone to data and information leakage of security risks and other issues; currently in the network to protect the data The password of information is relatively simple, and most of them use open-source passwords, which are easy to be broken, and there is a great security risk. Therefore, it is necessary to study and implement the Cryptography Law of the People's Republic of China in depth, and to form an atmosphere of learning passwords, knowing passwords and using passwords in the whole society. It is necessary to strengthen the research on basic cryptographic theories and cutting-edge technologies, enhance the key core technologies, innovate cryptographic algorithms, improve the security and reliability of algorithms, and vigorously promote the use of cryptographic technologies such as new secure cryptographic algorithms, high-speed cryptographic algorithms, data encryption, and secure management of keys, etc. in important information systems such as new infrastructures, important industrial control systems, government information systems, and other important fields, as well as in the governance of social security and business activities. Application. Apply cryptography in the whole life cycle of network data and information collection, transmission, storage, analysis and processing to ensure the security of network data and information.
3In the new infrastructure to build a network from the basic layer to the application layer of the network hardware and software intertwined with each other through the network security technology security system system.It is necessary to innovate the idea of safeguarding network security and change the past thinking of safeguarding network security mainly from the application layer through technology. From the analysis of a large number of network security incidents and cybercrime cases occurred over the years, it is difficult to guarantee network data information security from the application layer, and it is necessary to embed the ideas, policies, regulations and security technologies to guarantee network security into the network system's hardware foundation layer (bottom layer), operation layer (middle layer) and application layer (top layer), to form a layer-by-layer division of labor responsible for the protection of the layers up and down the mutual intermingling of the implementation of the The network security system is protected by layers, combined by articles and layers, each responsible for its own responsibility, coordinated and integrated network security system technology security ecological protection system. In the new infrastructure of network security, network security standardization should be strengthened, and network security products and systems should be integrated with the new infrastructure, interconnected and shared for common security, so as to avoid vulnerability risks and other security problems arising from the inconsistency and irregularity in the standards of software and hardware of the network system.
4In the new infrastructure for network security, a three-dimensional, all-weather security technology system for network security protection, early warning, response and disposal is being constructed.Network security is not safe, people in the network system is mostly invisible, can not touch, unless the computer was black screen, paralyzed only to realize that there is a problem, and data and information theft, leaks, etc. Most of the God knows what, on the network of security issues occurring in the network is easy to be ignored do not pay attention to. The people who do network security know that there are serious risks and problems in network security, always emphasize that the network system is vulnerable to hackers, hostile forces and foreign anti-China forces and other attacks to prevent and combat the risk of "crying wolf", which requires the people who do network security from the technical answer to the question of "Where is the wolf? Where are the wolves?" This requires that cybersecurity personnel technically answer the question "Where are the wolves?".
The new infrastructure network security products and systems should be able to do the risk of attacks and other security threats to the network system.Real-time detection, global sensing, timely detection, accurate warning, effective response and disposalThe company is striving to“能预防、进不来、准预警、拿不走、打不开、读不懂、自销毁、会追踪、保证据”,To make the risk of network system security problems through data, charts and other visualization, so that people can see, feel, know the hazards and dispose of them.Solving the "wolf is coming" "where is the wolf?" The problem.Strengthening network security prevention technology, early warning technology, control technology, disposal technology, traceability technology, investigation and forensics and electronic data identification technology, hardware equipment and facilities, the development of key basic technology products and systems and application development, to build network security protection, early warning, response and disposal system.
5.(c) Establishing a system of laws and regulations to revise and improve the new infrastructure for cybersecurity, and promoting the rule of law for the cybersecurity governance system and governance capacity. Maintaining and safeguarding the network security of new infrastructure must adhere to the technical security + management security "two-wheel drive" to ensure security, management must be standardized, the rule of law, according to the law to build the network, according to the law to use the network, according to the law to manage the network. In the new era and new situation, we must constantly revise and improve the relevant laws and regulations related to the new infrastructure network security, build a perfect new infrastructure network security laws and regulations system, in accordance with the law and regulations to clarify the new infrastructure technology, equipment and facilities and systems related to national network security, import and export approval of the core key technologies, as well as the use of foreign products in the domestic network system of the new infrastructure, the list of systems, network products, systems, equipment and facilities supply chain security, and to protect network products, systems, equipment and facilities supply chain security, in accordance with the law to ensure that the network security. , equipment and facilities supply chain security, and safeguard the security of network products, equipment and facilities, and network systems in accordance with the law. It is recommended that the State formulate and promulgate the Personal Information Protection Law and the Data Security Law as soon as possible, and formulate laws and regulations such as the Regulations on the Safety Management of Key Products, Equipment and Facilities of Network Systems, so as to make clear the responsibilities of governmental departments for the supervision of network security in the new infrastructure, the main responsibilities of enterprise technology, and the maintenance responsibilities of individual netizen applicants, and to implement the"Cybersecurity for the people, cybersecurity by the people".To build a community in which everyone has responsibility, everyone does his or her part and everyone enjoys cyber-social security governance, and to cast a new infrastructure for the people to protect cybersecurity as a brick wall.
To establish a system of notification of cybersecurity incidents by the national authorities and institutions, to set up internal notification, social notification system mechanism, timely and accurate notification of the occurrence of cybersecurity incidents, as well as the technical means and methods used by the endangered parties, the harm caused by the hazards and methods of disposal, and strive to minimize the harm caused by the loss of damage. It is necessary to increase social publicity on cybersecurity, raise the awareness of the whole society on cybersecurity, let people understand and master the ability to deal with and respond to cybersecurity problems and incidents in a timely manner, and lay a good foundation for maintaining and safeguarding cybersecurity of the masses and the legal system of governance in accordance with the law. Recently, China has put forward the Global Data Security Initiative, calling on information enterprises not to set up backdoors in their products and services; if countries need to access data across borders for law enforcement purposes such as combating cybercrime, the issue should be resolved through mutual legal assistance or other relevant multilateral and bilateral agreements; and calling on all parties to support the Global Data Security Initiative and jointly promote the formulation of global rules on data security, so as to safeguard the security of cyber data and information.
5.Vigorously strengthen the construction of cybersecurity disciplines and specialties and the training of talents in the new infrastructure of cybersecurity. The construction and development of new infrastructure network security cannot be separated from talents, and network security talents are fundamental to the maintenance and protection of network security; things depend on people, and nothing can be accomplished without talents. China's network security basic theoretical research, curriculum, teaching materials, disciplines and professional system can not keep pace with the development of new network security technology, network security personnel training quantity and quality is far from meeting the needs of the actual social sector, in particular, the lack of both network security technology, network security management personnel. We must accelerate the cultivation of network security talents, pay special attention to cultivate compound talents with strong theoretical and practical ability, adhere to the cultivation and training mode of "walking on two legs" of academic education and job skills training, and continuously improve the quantity, quality and level of education and training of network security talents. It is necessary to seize the historical opportunity of new infrastructure, actively build a professional system of cybersecurity disciplines, strengthen cybersecurity theoretical innovation, adhere to the problem-oriented, timely discovery and summarization of new theories, new technologies, new experiences, new methods and new lessons learned in the new infrastructure of cybersecurity, and continuously innovate new theories of cybersecurity, so as to lead the research and development, manufacturing, and application of new technologies, new products, and new systems with the new theories.
Given that the scale of training of network security personnel in China's colleges and universities is difficult to meet the needs of society, it is necessary to increase the strength of job skills training, and encourage colleges and universities, research institutes, enterprises and other social forces to organize network security job skills training, and to make efforts in the number of trainings, the quality of cultivation and the ability of hands-on practice, and implement theIntegration of teaching, learning, practicing and warfareThe teaching and training model of the training to train first-class combat-oriented network security talents who are prepared in both offense and defense. Last year, I proposed to buildCybersecurity "Jubilee" training and innovation complexIt focuses on training both offensive and defensive cybersecurity talents who are capable of real-time attack and defense confrontation. The comprehensive base for training and innovation in cybersecurity "Zhu Rihe" has the following features.Functions of the "nine platforms": training platform, display platform, query platform, testing platform, exchange platform, innovation platform, entrepreneurship platform, publicity platform, service platform, if the functions of these platforms can be made real and bigger and stronger, it will certainly make due contribution to the construction and development of new infrastructure for network security in China, as well as the cultivation of network security talents.
