Maintain national network security, build a shield of protection to escort national security

With the rapid development of network security and information technology, and the arrival of the era of universal Internet, the key information infrastructure related to national security, social stability and economic development has become a "contentful place" for cyberspace security. General Secretary Xi Jinping pointed out at the "4.19" cybersecurity and informationization work forum that "the key information infrastructure in the fields of finance, energy, electricity, communications, transportation, etc. is the nerve center of economic and social operation, and is the center of network security. It is also a target that may be subject to key attacks. The key information infrastructure in key areas such as energy, communications, transportation, and finance is facing more and more security threats around the world. One shocking case tells us each. Participants in cyberspace, once the security of critical infrastructure is attacked, will not only cause their own embarrassment, but also disrupt the state order and affect the country's economic and social development.

Maintain national network security, build a shield of protection, escort national security

The world is not too flat, the threat is getting worse

Maintain national network security, build a shield of protection, escort national security

If the virus that invades our personal computer is a common cold, then once the key information infrastructure is infected, it is a heavy flu that requires hospitalization. In recent years, attacks and sabotage against critical information infrastructure have continued to occur. From the Ukrainian grid in 2015 to the 2016 US World Wide Web, the invasion of Brazilian banks and the global outbreak of the “WannaCry” ransomware in 2017, the intensity and scope of attacks on key information infrastructures continues to expand. Through phishing attacks, DDoS attacks, using operating system vulnerabilities to deploy attack programs, and inserting malware, hacker organizations illegally control important industry information systems to be infected by viruses. Important data has been leaked and destroyed, and the means are endless and threatening. How to effectively cope with the increasingly complex network security environment and effectively protect the security of the country's key information infrastructure has become a common security issue facing all countries in the world, including China.

Maintain national network security, build a shield of protection, escort national security

Cyberspace is also a territory, and countries all over the world have reloaded. The world's major powers such as the United States, Britain, Germany, and Russia have made key information infrastructure protection an important task for national cybersecurity. The introduction of policies and regulations is the main practice in today's countries. Among them, the United States, as the first country to carry out the protection of key information infrastructure, in addition to issuing a series of policies and regulations such as the "Framework Specification for Enhancing the Security of Critical Infrastructure in the United States" and the Administrative Order to Enhance the Security of the Federal Government Network and Critical Infrastructure Network, In the 20 years of exploration, a relatively complete management system and capability system has been formed. In terms of organizational structure, the United States has established an organizational structure in which the Department of Homeland Security is the national governing body, and relevant departments and regulatory agencies protect the security of critical national information infrastructure within their respective mandates. In terms of operational mechanism, the United States responds to threats to the government's critical infrastructure by implementing the Federal Information Security Management Act, implementing Einstein and other projects to deploy intrusion detection and defense systems; and 80% of the country's critical infrastructure for private enterprises. Collaboration between government and private companies, as well as across departments and regions, through public-private collaboration mechanisms and various coordination committee mechanisms. In terms of capacity building, through the cooperation with well-known companies such as McAfee, Symantec, IBM, etc., to build a positioning and characterization technology for threats in key information infrastructure, cloud-based network analysis situation-aware technology, automatic alarm Predict system capabilities such as cyber attack technology.

Build a shield of protection to escort national security

From national strategy to specific implementation measures, China has always attached great importance to information security protection in the field of key information infrastructure. The National Cyberspace Security Strategy clearly states that all necessary measures must be taken to protect key information infrastructures and their important data in the fields of energy, finance, transportation, education, scientific research, water conservancy, industrial manufacturing, health care, social security, and public utilities from attack. Destruction, improve network security protection capabilities, and safeguard national sovereignty, security, and development interests. General Secretary Xi Jinping solemnly proposed to work hard to build China into a network power and accelerate the construction of a key information infrastructure security system. This points the way for China to carry out the security protection of key information infrastructure.

The warnings are constantly coming and the threats are preventable and controllable. China has continuously accelerated the legislative process and the organization and operation system of the security protection of key information infrastructure. The "National Security Law" and the "Network Security Law" were successively issued, and the "Key Information Infrastructure Security Protection Regulations (Draft for Comment)" was publicly solicited for comments, and the legal system framework for key information infrastructure was initially constructed. At the same time, under the leadership of the Central Network Security and Informatization Leading Group, the Central Network Information Office was initially formed as the top-level coordination and leading agency for national key information infrastructure security, and the horizontal is related to the Ministry of Industry and Information Technology, the Ministry of Public Security, the Ministry of National Security, and the State Secrecy Bureau. The ministry is the main body, and the network organization management and operation structure with the local network information office of the province, city, district and county as the main body is started. In 2016, the nationwide critical information infrastructure network security inspection work will be started.

China's key infrastructure protection work is moving towards standardization and systemization. In the follow-up work, it is necessary to strengthen the following aspects: First, the introduction of supporting rules to clarify the main responsibility of the industry. Clarify the specific subject responsibility and lead units and specific responsible departments of various industries, and truly implement and play the role of protection and supervision of various industries. The second is to establish a linkage and cooperation mechanism across government levels, across enterprises and across industries. Establish linkage and collaboration and coordination mechanisms between the government and industry, government and enterprises, industries and enterprises, and governments at all levels, between industries at all levels, and between major enterprises, and share data and information resources. The third is to improve the security and controllability of key information infrastructure. Vigorously promote the research of independent controllable technologies, increase the security risk investigation of key information infrastructures, and eliminate the hidden dangers and threats of operating systems, servers, database “backdoors” and “vulnerabilities” in critical infrastructure and important domain information systems. The fourth is to accelerate the construction of a key information infrastructure security system. For the enterprise production network, office network and Internet where the key information infrastructure is located, build a security protection system covering “discovery-defense-response-disposal”, create a high-level security service guarantee platform, and improve the overall security of key information infrastructure. Protection ability.

Cyberspace is not too flat, and security threats are on the road! This "land of competition" for cyberspace security must become the Gucheng Jintang in the territory of our cyberspace. In this battle against time, we have been on the road.

Medical Atomization

The utility model relates to a medical atomization treatment and humidifying device belonging to the technical field of medical equipment and household appliances.


Professional Medical Atomization manufacturer is located in China, including Medical Vape,Dose Control Vape Pen,Supersonic Wave Vape, etc.2-2

Medical Atomization,Medical Vape,Dose Control Vape Pen,Supersonic Wave Vape

Shenzhen MASON VAP Technology Co., Ltd. , https://www.cbdvapefactory.com