Explore the future of network security

Author:Guangming Daily Time:2022.07.09

With the in -depth advancement of digitalization, networking, and intelligence, the impact of network security on the overall security of the country, economic and social operations, and people's production and life of people's production and life are becoming increasingly prominent. How will network security develop in the future? During the 2022 West Lake Discussion Sword · Network Security Conference with the theme of "Building a Security and Trusting Digital World", it was hosted by the China Network Space Research Institute, and a security hosted by "China Network" magazine, Guangming.com, and Anheng Information At the Trend Forum, people in the industry joined hands to look forward to the "path of network security in the future".

New concept should be cope with network risks

"Cyber ​​security is an eternal proposition. Security and trustworthiness are dynamic and parallel, implementing trusted certification, and achieving the expected calculation goals, which is equivalent to ensuring health by strengthening immunity. Therefore, it is necessary Promote the application to build a guarantee system, "said Shen Changxiang, an academician of the Chinese Academy of Engineering.

"In the era of digitalization, 'digital security+digital trust' has become an important proposition. As we comprehensively enter the digital world, future trust propositions will face huge challenges. How to generate new value by establishing trust is a question we need to think deeply about thinking. . "Fan Yuan, chairman of Anheng Information, believes that to pay more attention to the importance of data security, future digital assets will become the" blood "that runs through digital governments, digital society, digital economy, and digital culture.

Li Fenghua, director and researcher of the Seventh Engineering Department of the Institute of Information Engineering of the Chinese Academy of Sciences, believes that at present, the interaction of frequent cross -border, cross -system, and cross -ecological circles of user data has become the norm. The theoretical system of privacy protection.

In response to the construction of the development and application of "autonomous and safe and controllable industrial software", Lan Yuqing, a professor at the School of Software, Beijing University of Aeronautics and Astronautics, believes that industrial software is the "brain" and "nerves" of industrial manufacturing. Factors such as incomplete talent evaluation mechanism and lack of manufacturing talents have caused most of them to be monopolized by foreign countries. "It is recommended to gradually promote the establishment of discipline construction, talent training, and production and research mechanism, and make efforts from multiple aspects to solve the shortcomings of core industrial software."

New technology guarding network security

At present, new technologies and new technologies such as artificial intelligence, blockchain, 5G/6G, satellite Internet, and intelligent connected cars are placed in all new technologies, while constantly bringing new security risks, while promoting the continuous update of protection technology.

From the perspective of the development of security trends, privacy computing has attracted much attention as an important underlying technology in recent years. According to Fan Yuan, the privacy computing technology uses the method of "the original data is not out of the domain" and "data available", and the model calculation of multi -party data is calculated to allow the data value to be effective. Tube and traceability.

Li Fenghua said that in the interconnection environment, digital resources have been widely excavated. But at the same time, the terminal APP is generally collected, AI big data is cooked, etc., which are all challenges facing privacy data. "We must focus on solving the dynamic and quantitative indicators of privacy perception, establish an evaluation index system and evaluate automation, and focus on auditing and tracing the origin of infringement; Make blind packaging. "

How to ensure the safety of public system in the 5G fusion scenario? "The hacking technology of the 5G era continues to iterate, and the advanced 'network weapon' has continuously launched an attack on key information infrastructure and military facilities." Zhang Ni, director and researcher of China Electronic Information Industry Group Co., Ltd. Combing the development of the development of risk control, and through the construction of the in -depth defense and safety disposal system in the construction control system in the construction of 5G fusion scenarios, the key technologies of the integrated security and protection of the industrial control system are broken.

In response to the current zombie network that often appears, Xu Jian, a senior engineer of the National Computer Network Emergency Technology Treatment and Coordination Center, mentioned that the zombie network profit method includes DDOS attacks (distributed service attacks), mining, spam, etc. For security agencies, according to the characteristics of zombie network communication, it is necessary to establish an abnormal monitoring technology model in multiple stages such as vulnerability, installation implantation, and attack implementation, and found that known and unknown zombie network spread chains.

New Perspective Outlook Network Development New Trends

Based on the current trend of network security, what new trends will it present in the future? The reporter noticed that the round table conversation session of this forum is also interesting. With the theme of "Exploring 2050, Future Digital World Security Dialogue", based on the current development of future development.

At present, there are divergent opinions on the Yuan universe. In the future, what safety issues will the Yuan universe breed? "6G and other new communication technologies, the new generation of Internet (Web 3.0), AR/VR/MR, game engine and other technologies such as native security risks will be copied to the Yuan universe." The dean of the college Lin Weiguo said. Zhai Lidong, a researcher at the Institute of Information Engineering of the Chinese Academy of Sciences, also believes that the essence of cybersecurity is confrontation. In the Yuan universe, it may be represented by the confrontation between humans and AI; question.

In addition, Li Xiaoyong, dean of the School of Network Space Security, Beijing University of Posts and Telecommunications, mentioned that in addition to the basic security of information protection in the universe in the universe, you should also notice that the scale of equipment and data in the Yuan universe will be larger and integrated, and it is integrated and integrated The trend is more obvious. How to do security protection will become a new proposition. At the same time, it is necessary to review the virtual environment of the universe different from the real society from the perspective of governance and legislation. In the future, what new technologies will be expected to affect the network security industry? Lin Weiguo said that the security industry and the underlying certification scenarios must rely on password technology, and quantum computing technology will be a new issue in the field of password technology. Therefore, it is necessary to master the quantum computing technology of autonomous property rights, strengthen the research of password algorithms for anti -quantum attacks, and resist "quantum hegemony".

"We must abandon the idea of ​​defense and follow the attack and run, and let the defender have the ability of an attacker to examine the existing security architecture from the perspective of an attacker. This will be an effective way to reduce the gap between attacks and defense. Attack and anti -splitting, the integration of offensive and defensive capabilities should be achieved. "Said Jin Fei, the founder and CEO of Beijing Yunke Anxin Technology Co., Ltd.

On the basis of focusing on technology, Li Xiaoyong also emphasized the role of people. "It is also necessary to fully consider the factors of people in network security, and strengthen civil defense while technical defense." Li Xiaoyong said that "inner ghosts" may bypass the firewall, and they are very familiar with the internal environment, data, and resources. destroy. "In the future, we must pay attention to the control of the internal threat of network security." Li Xiaoyong said.

(Guangming.com reporter Li Zhengzheng Yao Kunsen Kong Fanxin)

【Edit: Chen Wentao】

- END -

Grade 5.8 and 6.0 earthquake -level earthquake -level emergency response occurred at Malcon City, Si

Xinhua News Agency, Beijing, June 10th. According to the China Earthquake Network, at 0:3:00 on June 10, a magnitude 5.8 earthquake occurred in Malcon City, Sichuan, with a depth of 10 kilometers;A m

The retrograde service team carried out fire safety training activities for Huating City Pension Center

In order to further improve the level of fire safety management of pension institu...