Information Age: sounded the National Information territory security alarm

Source: Internet
Author: User


More and more risks and threats to information territory security

● The Security of Information territory changes the structure of national space consisting of territory, territorial waters, and airspace ● the Security of Information territory in the Information Society plays an important strategic role in national security ● The whole society should work together to build security great Wall of National Information territory security

Information security refers to the security of human information spaces and resources.

In different times and different stages of social development, national security has different contents and priorities. In the information society, the information Territory divided by information radiation space is infiltrated into the territory of traditional countries such as land, sea, air, and heaven. The security of information territory seriously affects the security of other regions. Whether it is a conflict between countries or a conflict within the country, whether the conflict involves political, economic, military or social fields, it is closely related to the security of information territory. The information territory has changed the structure of national space consisting of territory, territorial waters, and airspace, so that national sovereignty has a new connotation. Without information security, political, military, and Economic Security lacks assurance, and national security is complete. Therefore, maintaining information territory security becomes one of the core contents of safeguarding national sovereignty.

At present, the vast majority of developing countries and underdeveloped countries are facing internal and external threats to information territory security. External threats to information territory security mainly come from the control and monopoly of information in developed countries. In today's world, most western developed countries have gone through the course of industrialization and started to enter the information society. However, most developing countries and less developed countries have just entered the informatization threshold and are in the development phase of informatization, industrialization, and rural development. Some Western scholars claim that as humans enter the information age, countries around the world can develop on the same starting line. This is actually unrealistic, because the different stages of development determine that the informatization development process will be different. Developed countries and developing countries, as well as developing countries, have a technological "gap" in informatization, which will determine the future strategic pattern of the information world. Western developed countries are indeed actively promoting the informatization of human society, but the premise is that the majority of developing countries should follow their planned "informatization Road Map" and be included in the information map they depict. Facts have proved that informatization brings far less cost to developing countries and less developed countries.

The development of the Internet is an important sign of the development of information technology in the world. Currently, developed countries have absolute control over the Internet and its online information resources. Taking the United States as an example, the United States has an absolute advantage in the development and use of information resources. The number of Internet users in the United States accounts for half of the total number of Internet users in the world; the United States accounts for more than 70% of the total number of websites in the world, and the United States accounts for more than 90 of the 100 most visited websites on the Internet; 90% of global Internet services are related to the United States; the United States has almost dominated all major decisions in the global Internet management process; the United States controls 80% of the world's computer systems and software markets, as well as the technology of computer central processor, computer operating systems, and key networking products. As the United States is the beginning of the development of the Internet, the United States manages Internet domain name service systems, network information centers, transmission control, and Internet protocols. English Information dominates global Internet websites. The United States has nine of the 11 global Internet Information Exchange hubs, there are 13 top-level domain name servers in the world, 10 of which are in the United States.

The status of the "dominant" information in the United States has given the United States an opportunity in global political, economic, military, scientific, and diplomatic aspects. This strategic advantage of information has received high attention from countries around the world and many Internet groups.

In addition to external threats, internal threats to information territory security cannot be ignored. This is highlighted by: first, there are more and more new situations on the network, and the changes are getting faster and faster. Some local and regional problems of the country and society can easily spread over the network to a global problem. Second, espionage and other domestic and foreign hostility use the Internet to steal, spy, buy state secrets and intelligence, and use the Internet for communication and information transmission, organize command, and conduct destructive activities. Third, the penetration and expansion of terrorism into the information network field further increased the threat of cyber terrorism activities. For example, terrorists can plan, collect, contact, and steal information related to terrorist activities on the Internet, and use hacker and computer virus technologies to launch attacks on important national infrastructure information networks.

The important position and internal and external threats of Information territory security in the information society indicate that although information territory security is a technical problem, it is a strategic issue first. Only starting from the strategic level can we effectively maintain the security of information territory. At least the following must be done to maintain the security of information domains from a strategic perspective:

I. fully understand the risks and threats faced by information territory security. Based on the basis of security protection, we will focus on strengthening early warning and emergency response. From a deeper and long-term perspective, improve countermeasure formulation, hidden danger discovery, security protection, emergency response, and Information Confrontation capabilities, achieve security control over networks and information systems, and reduce network and system vulnerabilities; in the event of a passive information attack, the damage is minimized and the recovery time is minimized.

2. Establish a system, complete and effective information territory security strategic system with technical autonomy, reasonable structure, and agile response; comprehensively improves information security defense, control, protection, emergency recovery, and reconnaissance and attack capabilities in the Information territory, and ensures the security of basic information networks and important information systems; create a safe and healthy network environment, achieve synchronous development of information territory security and information construction, and safeguard national security, social stability, and the legitimate rights and interests of the public.

3. Various measures should be taken from the aspects of organization leadership, maintenance stability, prevention and control, key protection, emergency handling, legal construction, standard and standard specifications, personnel training, technology R & D, and industrial development, through the joint efforts of the whole society, we can build a great wall to safeguard the national information territory.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.