National information security strategy in large data age

Source: Internet
Author: User
Keywords Security information security state letter Constant United Nations

Angela Merkel's mobile phone was monitored, the incident erupted, known as the world's safest intelligent mobile phone blackphone at the Black Hat security conference by the hacker team 5 minutes to obtain the system's highest authority, Hollywood pornographic incident caused by the uproar ... To the national dignitaries, down to the individual, information technology in bringing rich resources, fast delivery, efficient office and other facilities, but also inevitably brought to the countries of mobile phone security risks. In this information security contest, which has no smoke and no borders, all countries in the world have taken various measures to deal with effectively.

How to protect the security of mobile phone information? Urgent need to think and solve

Improve the policies and regulations. Germany approved the first information-related "four-year development plan" in 1974, enacted the Digital Protection Act in 1977 and issued the German cyber-security strategy in 2011. The British network security Strategy was officially published in June 2009, and a new network security strategy was published in November 2011, and further practical plans and programs were proposed on the basis of continuing to attach great importance to network security. Canada's domestic network security legislation continues to make progress, the "suppression of Internet and Wireless Spam Act", "Protection of Canadians Personal Information Act" and so on are being established and improved, and increased the change in the existing law. China, through the "National Standing Committee on the maintenance of Internet security decisions", "the People's Republic of China Telecommunications Regulations" and other relevant laws and regulations, to safeguard the freedom of citizens, the protection of enterprises and citizens of the rights and interests of information activities have made clear provisions.

Build cyber warfare forces. Japan at the end of 2005 has been prepared to form an armed three self-guard computer experts composed of about 5000 of the network Warfare Force, specializing in network system attack and defense. After the "Snowden incident", India actively recruited a large number of Internet experts to build its own "network security system", while actively building the legal system. At the beginning of 2013, Russian Defense Minister Shao Yi ordered the Russian general Staff to finalize the plan to establish the Army Cyber Command before the end of the year. The findings of the United Nations Institute for Disarmament Research show that 46 countries in the world have formed cyber warfare forces, and many countries are still investing in cyberspace security.

promote international cooperation. In maintaining information security, Canada attaches great importance to international cooperation in cyber security, actively participates in discussions with international organizations such as the United Nations, NATO and the group of eight on cyber security, joins the European Convention on Cybercrime, and forms the closest security and intelligence partnership with the United States, Britain and Australia, At the operational and strategic levels are constantly strengthening cooperation. Germany would like to establish and maintain extensive cooperation between the EU and the world, cooperation within the federal government, the public and private sectors responsible for the Federal Information Technology Agency, and the establishment of a national cyber-defence Centre, a national network security Committee, This provides a flexible and firm implementation guarantee system for the German Government to implement the network space security strategy in full. Russia has adopted a tougher security strategy and has helped to shape the country's cyber-space security strategy. In September 2011, Russia, in conjunction with the Permanent Representatives of China, Tajikistan and Uzbekistan to the United Nations, sent a letter to the United Nations Secretary-General requesting that the International Code of Conduct on Information security, drafted jointly by the aforementioned countries, be circulated as an official document of the 66th session of the General Assembly, and called upon States to It is hoped that all countries will reach a consensus as soon as possible on rules for cyberspace behavior.

Increase capital investment. The U.S. Department of Defense in 2012 on network security and network technology budget reached 3.4 billion U.S. dollars, mainly for the new generation of network weapons research and development. The NATO C3 Bureau (NC3A) signed a network defense investment plan worth about € 58 million in March 2012. South Korea invested 1.9 billion won in 2012 to launch a "white hacker" program to train network security personnel.

Strengthen active isolation. Russian Federal space Agency for a number of subordinate enterprises to purchase domestic anti-hacking mobile phone, and asked to engage in a secret dialogue must use the mobile phone. In some areas of China, civil servants to prevent the leakage of mobile phone information, switch to domestic encrypted mobile phones.

Security, hardware and software focus. It is understood that in the global information security market, the share of developed countries reached about 80%. According to Gartner, global information security infrastructure consumption will reach $86 billion trillion by 2016. Developed countries have higher information level and higher level of development of information security industry, therefore, in the market share of information security, Information Security Service market share is the largest, security software and security services become the focus of national development. The global security hardware market is growing, the old security vendors such as Check Point, Fortinet, Juniper, Cisco (Acquisition of Sourcefire) and so on in their respective fields have a certain advantage, China's latest research and development for Android smartphone confidential (private) Information clearance of professional equipment-secret no trace-mobile phone leak-proof information equipment and other products continue to independent innovation, all kinds of security software, hardware is highlighted and improved.

Industry self-discipline. Some countries actively try and promote the network industry self-regulation, in order to achieve the purpose of network control, Britain is the representative of this practice.

  

The countries of the world begin to make the countermeasure research to the handset information security

The rapid development of information technology makes the function of related products more and more rich, synchronization also increases the pressure of national information security prevention. In the large data era, which plays an important role in the information resources, it is urgent to ensure the security of the mobile phone, which is a significant medium carrying abundant information resources. In the face of increasingly complex international information security environment, countries are constantly strengthening the construction of a strong barrier against information intrusion.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.