FU: Mobile Internet security requires Chinese enterprises to master core technology
Source: Internet
Author: User
KeywordsInternet security Fu
April 10, Boao Forum for Asia 2014 Annual meeting opened in Boao, Hainan, Cheetah Mobile (formerly Jinshan Network) CEO Fu was invited to attend the "Cyberspace Code of Conduct and international cooperation" forum. Fu with former UN deputy secretary General Sha, Global foundation secretary Steve Howard, academician of Chinese Academy of Engineering and chairman of China Internet Association Hequan and other political and business leaders, share their own security concepts and the company's international achievements.
Fu that because the network and people are more and more close, from anti-virus to server security, protocol layer Security has great security risks. The original infrastructure is simply information transmission, and it is doubtful whether the security impact of large-scale applications can be maintained.
In the mobile internet age, viruses and Trojans will pop up faster than ever before.
The safety problems of flirting have become less, and security problems related to economic interests have appeared on a large scale. In particular, a single point of supply, the light on a software difficult to solve.
The increase in point-to-point attacks makes it hard for a simple security solution to really work.
Relying on the government itself is difficult to adapt to the rapid development of the internet rhythm, should help Chinese enterprises faster development, access to better technology, in technology and technology monopoly of the enterprise competition, there will be a stronger right of speech.
The following is FU transcript:
Cheetah Mobile has a product Jinshan poison PA, did more than 10 years of anti-virus and safety, the recent security situation changes very quickly. Don't know if you care no, a few days ago, just had a very famous loophole is "heart bleed". In fact, based on the Internet's most basic security protocol, is the encryption of security protocols, you use the Internet banking or payment software will be used in this protocol, itself is encrypted, but found a huge loophole, anyone can through the vulnerability in the server did not update to get the user's data.
I have a few feelings to share with you.
The first feeling, because the network and people more and more close. We are 10 years ago to do anti-virus is enough, today from anti-virus to server security, protocol layer Security has a huge security risks. The Internet, in fact, completed its infrastructure decades ago, when the internet was simply a transmission of information. When the Internet becomes a lifestyle today, can the original architecture withstand the security impact of large-scale applications?
The second feeling is that global integration has become apparent in the mobile internet era. We can find a lot of Chinese characteristics of viruses, trojans, we just need to pay attention to this piece is enough. Now the global integration of security issues are very serious, mobile phones have software to detect the security of mobile phones, we have to analyze the millions of app to know which section of the problem, once the outbreak of popular speed will be faster than before. As a local company, how to find deeper problems around the world?
Third, as the internet and the economy become more and more relevant, the number of practitioners is increasing, making the security problems that have only a handful of hacking techniques become less, and the security issues related to economic interests on a large scale, especially against single points of attack. Previous security software to solve a face can solve large-scale transmission, today due to more from the economic interests of the hackers appear, so that more of the single point of the problem, relying on a software difficult to solve. It is known that Bitcoin's trading site was hit, causing a lot of bitcoin to be lost.
I think the third problem is that because of the increased number of point-to-point attacks, it's hard to really make a simple security solution work.
As an entrepreneur to listen to all of you in the political things, some do not understand, I think so, there are two sides to everything, there is an old saying in China, to solve the bell still need to tie the bell people. In the Internet competition I believe that many countries have hegemony, but it is because of the development of the Internet, so that Chinese enterprises at this time have the opportunity to compete with the world's enterprises. We are a very small company, our product Leopard cleaning master in more than 50 countries in the world's Google Play tool list ranked first. What is called a bell-ringing person? I'm not worried about some countries using hegemonic control rules, I don't think the rules are easy to control, I'm worried about some big companies controlling rules. The big internet companies are emerging, and the entire security control is far more than we think.
Two days ago, the decommissioning of Windows XP was a major challenge for global security companies, and mobile internet core technology was not in the hands of Chinese companies. This is difficult for the Government itself to adapt to the pace of rapid development of the Internet. I hope that no matter what the governance structure, how to enable Chinese enterprises to participate in it becomes more important and urgent. To help Chinese enterprises to develop faster, to obtain better technical progress, in technology and technology monopoly of the enterprise competition, there will be a stronger right of speech.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.