Large data for national information security challenges the United States take the lead in taking measures

Source: Internet
Author: User
Keywords Large data information security

The past 2013 years have been called the "first year" by the media. Large data is another subversive change in the field of information technology after cloud computing and Internet, and it also opens the curtain of global cyberspace hegemony. Each country adjusts the information security strategy successively, puts the big data in the important position, seizes "the information superiority" and "The International discourse power". How about the development trend? See the science and technology daily special

The U.S. Navy has been developing and testing a series of miniature robotic submarines since 2009, according to the US Strategy page website January 5. These submarines run automatically under water, collect salt and temperature data, briefly surface every 1 hours or so, and return data via satellite. The data will improve the effectiveness of friendly sonar systems and make it easier to detect and track enemy submarines. This is actually an example of how big data is used in the military.

Large data refers to the magnitude of the amount of data involved to be able to capture, manage, process and organize information within a reasonable period of time to help organizations make their business decisions more actively. These data are all-encompassing, not only including people on the Internet published information, the world's industrial equipment, automobiles, electric meters have countless digital sensors, at any time to measure and pass on the location, movement, vibration, temperature, humidity and even the chemical changes in the air, but also produced a huge amount of data information. The strategic significance of large data technology is not to master the huge data information, but to deal with these meaningful data, through "processing" to realize the "value-added" of the data.

US military focus on big data

With the rapid development of new technologies such as IoT, cloud computing and mobile Internet, data is growing and accumulating at an unprecedented rate. People can't help but exclaim that the big Data age has come!

The latest advances in science and technology are often the first to be applied militarily, and large numbers have undoubtedly aroused widespread concern and interest among the military and government agencies. Previously, the most typical example of big data was the collaboration between the Los Angeles Police Department and the University of California using large data to predict crime.

In fact, as early as 1980, the famous American futurist Alvin Toffles in the third wave of the book on the "Big data" concept, and praised it as "the third wave of the CLS movement." Famous database experts, Turing Prize winner Jim Grey that the traditional experiment, theory, computer three paradigms in scientific research, especially some new research areas have been unable to play a good role in 2007, he proposed the "fourth paradigm" of scientific research, that is, data-intensive science represented by large data.

In recent years, some of the world's top academic journals have published a special issue to explore large data issues. Among them, "nature" has launched the "Big Data" special issue, from the Internet technology, environmental science, bio-medicine and many other aspects of the challenges posed by massive data. The science publishes a special issue on data processing that discusses the challenges posed by the deluge (deluge) and explains the importance of large data for scientific research. The Journal of the European Institute of Information Science and mathematics also deals with the issues of data management and technological innovation in the large data age, and introduces the research activities and progress of European research institutions.

Of course, the research and application of large data has attracted the attention of various government departments, and countries have promulgated national policies and strategies on large data. The Obama administration announced in 2012 that it would invest 200 million dollars to launch a "Big Data development initiative" designed to improve the ability to extract information from massive and complex data, another major technology development deployment following the 1993 US announcement of the "Information superhighway" program.

Following the first U.S. strategy to open big data, other countries have followed suit, or are about to launch a corresponding strategic move. The Japanese government has launched a new comprehensive strategy, "dynamic ICT Japan", focusing on the development of intelligent technologies such as cloud computing, sensors and social media for large data applications. In 2013, the British government announced that it would inject 600 million pounds to develop 8 types of high-tech, such as large data and synthetic biology, in which the information industry's burgeoning data technology would earn 189 million pounds, accounting for nearly one-third of total investment. The Australian government has also recently unveiled its Big data strategic planning programme.

As the highest level of information in the world's top military system, in response to the huge data challenge and continue to seek information advantages, to meet the "big Data" era, the U.S. Department of Defense took the lead in taking steps, and its senior Defense research program recently began to fund some "big data" project development, including "network internal threat" Project, " Insight Project, machine read project, Eye of Mind Project, X-Data project, etc.

National information security faces challenges

Large data generally refers to those size has exceeded the traditional scale, the general software tools are difficult to capture, store, manage and analyze the data, generally in "too Byte (TB)" as a unit. Generally, 4 "V" is used to generalize the main characteristics of large data: First, the volume of data is huge (Volume), secondly, the data categories (produced), the third, data generation and processing speed (velocity), four, data value density is low (value).

The above characteristics of large data for the industry, the scientific community, the military and the National information security field, opportunities and challenges coexist. For example, the development of large data has broken the traditional information architecture, from the data Warehouse-centric to the flow, connectivity and information sharing of the data pool, its technology research and development will promote information security technology to a higher level, so that information security monitoring more sophisticated, more real-time and more efficient. On the one hand, the intelligent driving security model based on large data analysis, from simple log analysis to comprehensive data analysis, greatly expands the breadth and depth of security analysis, helps to better monitor the abnormal behavior of the network, finds the data risk point and carries on the active information defense. On the other hand, the "clues" left behind by cyber attacks are hidden in large data in the form of data, and the use of large data technology can be more targeted to deal with information security threats, so that the network attacks do not hide, help to find the source of the attack.

Of course, with the further concentration of data and the increase of data volume, the existing information security means can not meet the information security requirements of large data times, it becomes more difficult to protect the massive data, and the distributed processing of data also increases the risk of data leakage. This is mainly embodied in the following four aspects: first, large data has become a significant target of network attacks; second, large data increase the risk of information disclosure; third, large data threaten existing storage and security measures; four, large data technology can be applied to attack means.

It can be seen that in the age of large data, information has become an important strategic resource for national and social development, as "the future World New oil" large data is a new round of science and Technology competition strategic commanding heights, a country in cyberspace data sovereignty has become the Lu Quan, sea, air rights, days after the power of another big power game focus. Especially with the continuous popularization and development of the network, people's understanding of information security has been developing. Information security is no longer just a grand field of military or foreign affairs, but a level that the public can reach; Information security is not only a technical problem, but also involves the public individual security, social public security and national information security, which is a strategic issue in many fields.

Building the information security "firewall"

The Big Data Development initiative, launched by the United States, involves 6 departments of the federal government to vigorously promote and improve large data-related technologies. The U.S. Department of Defense and its Defense Advanced Research Programme (DARPA) is one of six departments tasked to drive the initiative.

The national information security strategy generally has three main elements: infrastructure, war and diplomacy. So for the countries that are between the second wave and the third wave, the future national information security strategy, not only from these three levels to solve the traditional information security in the short board problem, but also plan ahead, timely transformation, the large data as an important point of focus, strengthen the top level design and policy guidance.

First, pay attention to the national and military information infrastructure protection, and effectively enhance the information security and prevention capabilities. As in the military field, with the explosive growth of the database, on the one hand, the database vulnerabilities more and more, the target that can attack increases, and attack target will be more exposed, on the other hand, the attack behavior that hides in the massive data is often difficult to be detected in time. Data security is the fundamental guarantee of large data application, and the leakage of core data will have a fatal effect on the whole war. Therefore, it is necessary to strengthen the protection of information facilities to ensure information security. In particular, we should break data separatist and blockade, integrate large data processing resources, promote data sharing among key databases, and strengthen protection against advanced sustainable attacks (APT).

Second, enhance the ability of information warfare to effectively ensure the right to information system. Information superiority is the core and pillar of the new military revolution, and it is the key to win the war. The information warfare has opened up the fifth dimension battlefield, the battlefield initiative from the land-making, the sea-making, the system-making, the right to the information system. The United States government's "Big Data Development Initiative" has incorporated the military into the "new military strategy" and "counter-terrorism strategy" under the global strategy. Therefore, the national information security strategy of other countries, on the one hand, should use large data platform to consolidate and strengthen the National Intelligence Information Network system, improve military intelligence information processing ability, so as to obtain, exchange and use the digitized information in time, to meet the information needs of commanders, combatants and security personnel at all levels, Enhance combat effectiveness by improving battlefield situational awareness; On the other hand, we should use the research and development of large data security technology, deploy the security measures of deep protection and multi-layer configuration to counter the information infiltration and intelligence theft of the enemy.

Third, give full play to information operation and psychological warfare strategy, and actively display public diplomacy. In the large data age, the national information security strategy should focus on the use of information exchange as an effective means of public diplomacy. On the one hand, through the large Data technology collection, analysis, screening of other countries ' information dissemination, so as to accurately perspective its strategic intentions, and effectively safeguard national interests; On the other hand, we should actively explore the value of large data technology in the field of public diplomacy, and focus on building the favorable international environment for national Development

Large data age is a national information security strategy another opportunity and challenge, only the large data into which, pay attention to the development and utilization of large data, grasp the engine of the new technology wave, in order to multi-level, multi-directional, multidimensional degree to maintain national information security, defend the country "information Frontier"! (Shi Haiming Wang Wensu Zenghua, Center for International Studies, National University of Science and Technology)

(Responsible editor: The good of the Legacy)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.