God code Guo for the proposal: combination of offense and defense formulate national information security strategy

Source: Internet
Author: User
Keywords Information security national information security Guo Wei
Tags abstract code developed countries global network group information information security information technology
Abstract: "The subject of attack and defense combination, the formulation of China's national information security Strategy" sponsor Guo for "review opinions" proposed to the Commission, the Central network security and information technology Leading Group, the Ministry of Industry Research and management of "keyword" information security strategy and offensive combination

 

The combination of "the" and "offense" to formulate our national information security Strategy

"Sponsors" Guo Wei

"Review opinions" recommended to the National Security Committee, the Central Network safety and information technology Leading Group, the Ministry of Industry Research Management

"Subject words" information security strategic offensive and defensive combination autonomous controllable

Content】

In the 2013, the "Prism gate" incident triggered by Snowden can be seen that the western developed countries, represented by the United States, have shifted from the passive defense of the state as the main body to the active and aggressive attack. As a network of 600 million Internet users and information security, the main injured country of cyber-attack, China should be driven by potential, should be dynamic, homeopathy, timely adjustment of national information security strategy, with the global thinking of the information security situation in China, the development of "offensive and defensive combination" of national information security strategy, and rapid deployment of implementation.

First, the passive defense of the network Security response strategy, adjusted to attack and defense combination of deterrence-type security strategy.

At present, China's mainstream information security ideas, is to build high walls, plugging loopholes, such as passive defense methods. In the first wave of global Internet, this idea has played an important role in protecting national information security. But as the world's second wave of internet power hits, with the popularization of cloud computing and mobile internet technology, the traditional network protection boundary is disappearing; at the same time, the new security threat is the extensive use of social engineering, in order to achieve latent, invasion, destruction, traditional security defense system is weakening, or even ineffective.

Therefore, we must look at the information security situation from the globalization angle, and formulate the new information network security strategy. In order to deal with the threat of network hegemonism and information warfare, we must clearly put forward the security strategy of "combination of offense and defense", actively promote the network information space deterrence, defense and confrontation ability, cultivate "offensive", "preemptive" network defense capabilities, "resist outside the country", for the future security attack and defense competition ready.

Second, actively promote the establishment of a global network environment, "The United Nations" and promote the implementation of relevant international conventions.

The eruption of the Prism Gate incident, on the one hand, it exposes the false faces of the western developed countries, such as the United States, which have failed to get rid of the "Cold War thinking", and has raised the thinking of the information security boundary in the global scope.

Network security is the common concern of countries all over the world, and it is not impossible to develop cooperative co-management of network information under the premise of eliminating suspicion and realizing mutual trust. China should strengthen consultation with countries and international organizations, jointly establish and perfect the global Network information cooperative governance structure, and promote the achievement and implementation of relevant international law and international conventions, slow down and even eliminate the occurrence and escalation of "cyber warfare".

At the same time, China should strengthen the cooperation and exchange with other countries and international organizations in Network space security standards and technology, discuss and study the internet issues such as transnational information security, and actively participate in the construction of Internet standards and rules, and change the passive situation in the establishment of Internet standards in China, To better defend China's network sovereignty, in the process of the establishment of the Internet international order more to send China's voice.

Third, actively promote the development of independent intellectual property network products, have the goal and step to enhance the key areas of network product localization rate.

We will vigorously develop the core technologies and products of the Internet, enhance the capability of independent innovation, and actively build a procurement environment conducive to the promotion of localization rate. To establish supplier access standards as soon as possible, related to the important areas of information security, we should first purchase products with independent intellectual property rights, for Homeland Security, national economic security and other core areas involving the livelihood of the nation, such as the military, government, finance, important state-owned enterprises, to set the network equipment, systems, the application of localization rate of the target and , supervised and implemented by designated departments.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.