Really anxious! China's cyber security "streaking" situation needs to change

"At present, China's network security still has major hidden dangers. On the one hand, the basic security protection system based on compliance requirements and known security risk protection has achieved good results, and basically formed a response capability against commercial-level security risks; At the same time, however, due to the lack of a system, security problems will still occur frequently. From the perspective of the risk of national confrontation, China's current network security is no different from 'streaking' in this scenario." Recently, the Great Wall Internet System of China Power He Weidong, general manager of Application Co., Ltd. said this in an interview.

Really anxious! China's cyber security "streaking" situation needs to change

He Weidong said that no matter whether it is a central enterprise or other security enterprise, it is urgent to create an independent and controllable IT product system and a new dynamic security system to support national security, and to achieve intrinsic safety (domestic for the new changes in business-level and national-level threat risks). Deep integration of process and process safety (industrial chain security).

One side is "protected well" while one side is still "streaking"

In recent years, China's network security work aims to implement the level protection requirements, and do a good job in all aspects. The organization system, management system, technical system and construction and operation and maintenance system are basically perfect, based on compliance requirements and known security risks. The construction of the basic security protection system for protection has achieved good results (“protection is good”), which basically forms a response capability against commercial-level security risks.

However, while achieving results, we must also see that there are still a large number of unknown or known “back door” and “vulnerabilities” risks from the perspective of dynamic attack and defense confrontation. The essence behind these risks is that because confrontational capabilities cannot be immediately transformed into protective products and deployed to form protective capabilities, these risks must be resolved in real time or quickly. It can be seen that the rapid use of security confrontation capabilities requires the construction of an anti-service system to deal with, that is, to compensate with high-capacity security services. Because of the lack of systems, security issues occur frequently. Therefore, from the perspective of the risk of national confrontation, the current network security in China is tantamount to “streaking” in this scenario.

According to He Weidong, the fundamental reason for "good protection" and "streaking" is that the threats under the new situation have undergone major changes. At present, the cybersecurity threats facing China can be divided into commercial-level threats and state-level threats. The core threat to national cybersecurity is state-level cyber threats, namely cyber attacks and deterrence between countries. A series of events, such as the “Prism Gate” and the Iranian nuclear power plant, indicate that the current national cyberspace security is a systematic confrontation of state-level cybersecurity capabilities.

By analyzing the development trend of foreign network security, we find that developed countries are already in the era of intelligent defense 3.0 characterized by intelligent iteration. Some developing countries have entered the era of active defense 2.0 characterized by security and control. The less developed countries are in compliance protection. Features a passive defense 1.0 era. However, China is now in the era of compliance and protection of passive defense 1.0, and the protection level is only a commercial-level security category. Compared with the current situation in developed countries, the gap between China's protection capability and national-level confrontation is obvious, and it is concentrated in the four aspects of development stage differences, technological generation differences, capacity generation differences and limited investment.

National network security and commercial network security are different

He Weidong introduced that there are significant differences between national network security and commercial network security in terms of risk sources, attack objectives, attack methods, input methods and protection modes.

The risk of national cybersecurity comes from national cyber warfare forces and national capabilities; the purpose of the other party's attack is to control or destroy the country's critical infrastructure; the attack methods used are hardware and software backdoors, cyber warfare weapons, and national security capabilities; To achieve the goal of confronting deterrence; technically, adopt an autonomous, controllable, threat-based active defense model. The risk of commercial network security is the hacker team; the purpose of the attack is to obtain commercial benefits; the attack method used is to find loopholes and penetrate at different levels; the input method pursues compliance and cost performance, and the enterprise independently invests; adopts the compliance defense mode; Protection capability is the security capability of a single industry player.

National cybersecurity faces the threat of national confrontation and is the contest of the top wisdom between countries. What should be adopted is the national cyber security strategy, based on the capability deterrence, benchmarking against the advanced countries' offensive and defensive capabilities, adopting state-level security economic investment, building a comprehensive industrial technical support system, supplementing legal deterrence, and researching breakthrough core technologies to create public Sex products, build a technical trust system based on national technology identification capabilities, and support the protection of key information infrastructure. Special investment is required and advancement is carried out in an orderly manner.

Commercial network security faces the threat of extreme individuals, hacker groups and economic crimes. It should adopt commercial network security strategy, with legal deterrence as the core, highlighting technology traceability and law enforcement capabilities, and meeting commercial network security objectives; building a single manufacturer or some manufacturers based on investment capacity. The technical support system of limited confrontation capability, perfect attack and defense capabilities, procurement and deployment of large-scale replicable non-public products and services, and its technical capabilities are based on commercial trust and market competition.

Three strategies to solve national network security problems

He Weidong said that our country attaches great importance to cyber security, established the Central Network Information Office, and formulated and promulgated the National Cyber ​​Security Law. Network security and informationization have risen to national strategies.

To solve the national network security problem, we must first follow the economic law of network security. Faced with the objective reality of "the cost of attack is getting lower and lower, the cost of defense is getting higher and higher", how much money is spent and how to spend money to ensure security has always been an important issue of concern to the security community in these years. Network security covers from the terminal to the network, from the application to the system, from the software to the hardware, from the management to the law, the scope is wide, and the number of categories is easy to cause network security. So, how much do you need to invest in security? There seems to be no absolute answer to this question. Security is dynamic, and from a technical point of view, any information system is flawed. The network security product itself is the solidification (productization) of the prior art, so when it comes to market, its technology is outdated. Therefore, security should be relative. Absolute security may only exist in theory. In practice, the balance between security and cost is needed, that is, the “best” cost is used to achieve the “best” effect, which also leads to the new information security theory turning to the “active defense based on attack environment” mode. The technical characteristics are embodied in autonomous controllable, trusted computing and dynamic monitoring. In the business model, it is reflected in the aggregation of platforms and service providers.

Second, we must gain insight into the evolution of the network industry. At present, network security technology has moved to real-time monitoring and risk prevention and control, and the network security format has also moved from the original "product format" to the "service format." The provision of network security will be done by professional network security service providers, rather than certain specific product vendors.

Finally, grasp the evolution path of network security technology. In order to meet the risk of commercial and national threats, in order to achieve the goal of national security, it is urgent to create a security service system that supports national security, and to create a national weapon: the eye of discovery - the eye of the risk and threat alert monitoring; The 金 —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— —— The ability to rebuild - to enhance the resilience of cyberspace infrastructure reconstruction; long-term talent - build a new high ground for cyberspace attack and defense personnel training.

"Vulnerability" and "back door" response

He Weidong suggested that the platform should share the economic model, effectively aggregate the service capabilities, and pay for the results to solve the "vulnerability" problem of dynamic security and the issue of national capacity transmission interaction.

The aggregation mode is to give full play to the superiority of the sharing economy, the platform economy, and the smart economy. Through the platform to accumulate various resources, the synergy between capabilities and needs can be effectively realized. This is like the “expert consultation” mode of hospital visits. Network security is similar to medical treatment. The way to meet customer needs has shifted from “single doctor consultation” to “expert consultation”, which has promoted the transformation and upgrading of the industrial chain from a single supply chain to a composite supply system, and solved national security and business in a military-civilian integration. Security requirements for different security service capabilities. By constructing a network security platform based on the establishment of a four-in-one network of countries, product suppliers, security service providers and users, the integration of multi-dimensional security monitoring, supervision and business service systems is an important part of the national network security system. Promote the transformation of dynamic capabilities, with the result of the hero, to solve the problem of indiscriminate charging and bad money to expel good money. Therefore, platformization is the only way for industrial upgrading and scientific development of large-scale, intensive and aggregated security service industries.

At the same time, with the deep integration of the whole process security of the security service industry chain, an active protection system based on the attack context is established to promote the self-immune capability of IT products, become a safe IT product, and solve the "back door problem."

From the development of the global network security industry pattern, it can be found that the development trend of network security products has gradually turned to "safe IT products." Network security products are becoming more specialized, and horizontal mergers and acquisitions are obvious. Small network security product developers are constantly being merged by large IT vendors to improve their products, so that new IT products not only have business processing capabilities but also security immunity.

At present, our independent and credible industrial ecosystem is progressing in an orderly manner. A basic and complete industrial chain has been formed. It has key core technologies including CPU (central processing unit), DDR4 (fourth generation memory), network chip, network equipment, disaster recovery, basic software, and application system development platform. With the trusted technology as the link, the new dynamic security system with intrinsic security and process security deep integration, basically realizes the independent controllable and secure IT product system and application.

China's electronic advanced layout has formed multiple experiences

According to He Weidong, based on the ultimate goal of national security needs, China Electronics has created a network security protection system, namely intrinsic security (localization alternative) and process security (industrial chain security).

China Electronics, in combination with its subsidiaries, clarifies that Great Wall Internet is the leading company of “process safety”. It targets the security needs of important government information systems such as Chengdu, Zhongshan and other important industries, and adopts aggregation, sharing, co-construction and mutual defense strategies. In accordance with the target framework of “discoverable, protectable, controllable, replaceable and capable”, the information security service is creatively and customizedly established, and the industrial chain of intrinsic safety, process safety and trusted technology system is basically established.

First, the platform construction forms a system structure. A networked industrial service system pattern of “1 safety data analysis center, 5 regional nodes, 2 municipalities, and 9 regional sub-nodes” was established. The online security service model, the industry-customized service model, and the secure IT resource service outsourcing model are all applied in many places.

Second, the core technology breakthroughs have made substantial breakthroughs. Great Wall Internet-owned enterprise Trustworthy Huatai builds intrinsic security around trusted computing, establishes a dual-system system that actively defends the immune system and computing system, and has significant innovations in computing and trusted dual-structure construction, and has reached the international advanced level. The technology of trusted active dynamic measurement control has reached the international leading level.

Third, the ecological circle construction has achieved remarkable results. Build an industrial ecosystem and a user ecosystem to form a safe service ecosystem. Strengthening close cooperation with the public security, security, industrial credit, and secrecy departments, and establishing an ecological circle composed of more than 80 partners, which has enhanced the industrial capabilities of international confrontation and formed an industrial pattern of “national advancement and people's advancement”.

The fourth is to build a new network industry system. Intrinsically safe, it has key core technologies including CPU (central processing unit), DDR4 (fourth generation memory) and network chip; process security has realized high security from protection, discovery, control, disposal and capacity building to ecological circle. The service industry's industrial chain is built; in the construction of a new security system, a new dynamic security system is formed that uses trusted technology as a link to integrate intrinsic security and process security.

The fifth is to explore the formation of new business models. Exploring and practicing the "IOS" service model and the aggregation service model, the platform has been practiced on the project, which fully demonstrates that the aggregate service model that combines the public measurement, the offline and the offline, and the payment of the analysis results can effectively improve the security service capability. Through the “National Progressive People”, the Open Data Analysis Platform for Safe Big Data was established, and the Trusted Computing Double-Creation Community was launched. The “Double Creation” was jointly promoted by the industry, and the win-win industrial environment in which state-owned enterprises entered and promoted private enterprises was built.

Wire Condenser

Wire Condenser

The condensing unit is used for refrigerator temperature control devices, air conditioners, heat pumps and coolers. They are called [gas refrigerants" by compression in the form of heat, then pumped through the coil system, and heated and cooled by the coiled air. The condenser unit is mainly used in commercial refrigeration systems and industrial refrigeration systems. The condensing unit mainly consists of Mono-Blocks For Cold Storage,Semi Hermetic Condensing Unit,Box Type Condensing Unit ,we can follow the customer's requirements to produce the correct size of the condensing unit.

Wire Condenser,Cold Room Condenser,Evaporator Condenser,Refrigerator Condenser

FOSHAN SHUNDE JUNSHENG ELECTRICAL APPLIANCES CO.,LTD. , https://www.junshengcondenser.com