NI Guangnan Academician: "Self-controllable" to implement network sovereignty

Source: Internet
Author: User

The cyber security week, which has just ended, has once again sounded a wake-up call to cyber security. At this year's World Internet conference, President Xi Jinping stressed the need to respect network sovereignty and maintain cyber security. "Network Sovereignty" became a hot word. As a new concept, how can "network sovereignty" be implemented? In this respect, Chinese Academy of Engineering Academician NI Guangnan in the interview with the Chinese science News reporter, said, there is no network security, no national security, network sovereignty.

Self-control is the precondition to safeguard the network sovereignty and safeguard the information security. The so-called "self-control" includes intellectual property autonomy controllable, the ability to control independently, the development of self-control and to meet the "domestic" qualification and other connotations.

According to the National Internet Emergency Center statistics, in the first half of 2014, the site was implanted in the back door of the website, 48.8% are controlled by the foreign IP address. In the top three who control the number of Chinese websites, the United States controls 6,118, Hong Kong controls 3,097, and South Korea controls 2,307. In the first half of the year, from the external IP address distribution of the domestic website, the United States accounted for 29.3%, South Korea accounted for 6%, Hong Kong accounted for about 5%.

"Self-controllable, information security easy to govern, products and services generally do not exist malicious backdoor, and can constantly improve or repair the vulnerability." Not autonomous and controllable means cowgirl, the consequence is that information security is difficult to govern, products and services generally have malicious backdoor and it is difficult to constantly improve or fix the vulnerability. "Ni Guangnan said.

He believes that due to historical reasons, China's information technology equipment imports, can not be self-controllable, there is a significant security risk. Domestic products and services are generally easy to meet the requirements of self-control, therefore, China must promote the localization strategy, in the network security plays a major role in information infrastructure and information key core technology, such as the implementation of domestic substitution. Among them, the intelligent terminal operating system is an important aspect.

"Practice shows that the intelligent terminal operating system has a high degree of monopoly." At present, China's individual enterprises are unable to undertake the task of developing intelligent terminal operating system. "Ni Guangnan said.

He suggested that the development of China's intelligent terminal operating system, should be absorbed "Beidou" and other industrial alliances experience, industrial organization innovation, play a decisive role in the allocation of resources in the market, through the formation of "China Intelligent Terminal operating system Industry Alliance", under the guidance of the Central network security and Information leadership Group Office, Integration of resources and collaborative innovation.

"The alliance can absorb private capital, set up an industrial fund that facilitates support for open source software and open source software workers, and can support and complement national science and technology projects." "Ni Guangnan said.

In NI Guangnan's view, the success of the intelligent terminal operating system depends largely on its ecological environment, "For this reason, the domestic operating system should adopt the ' application store ' mode, vigorously launch the Chinese vast number of software personnel to jointly build the ecological environment."

The construction of "domestic operating system ecological environment" includes perfecting the domestic operating system and its tool chain, developing various application software on the domestic operating system, porting the application software on the original Windows operating system to the domestic operating system, and integrating the domestic operating system with the original information system; Provides tools to help users migrate from a Windows system to a domestic operating system.

"The development of China's intelligent terminal operating system, to learn from the past some of the science and technology programs to" pepper "support causes fragmentation of resources, promote internal friction and can not form a combination of lessons, carry forward the ' two bombs ' and the human spaceflight spirit, to develop a system of national power, rather than decentralized power to engage in multiple systems. "To make China's smart terminal operating system the fourth system in the world following Apple, Google and Microsoft," Ni Guangnan said. "This article is edited by" Www.zrnkyy.com "

NI Guangnan Academician: "Self-controllable" to implement network sovereignty

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.