Source: Economic Reference Newspaper
Recently, at the "Inaugural Meeting of Luyuntian Network Security Research Institute and the First Yuntian Forum", authoritative experts in the field of network security exchanged and discussed the theme of "Opportunities and Challenges of Network Security in the '14th Five-Year Plan' Period" and discussed the new situation in the development of China's network security industry. In the view of the participating experts, it is necessary to adhere to independent innovation, strengthen the emphasis on key information infrastructure, industrial data security and other important areas, build a solid defense line for network security, and integrate the advantages of production, education and research to promote the benign and orderly development of the network security industry.
The forum was jointly organized by the Third Research Institute of the Ministry of Public Security, the National Information Technology Security Research Center, the National Industrial Information Security Development Research Center, the Software Research Institute of the Chinese Academy of Sciences and The Trust Service Technology Co., Ltd. Jointly established by the LuYuntian Network Security Research Institute.
Huang Yiling, president of Lu Yuntian Network Security Research Institute, pointed out that the development of China's network security industry has entered an innovative period, and it is impossible to copy the development model and path of other countries, and when it is time to look up at the road, the vision of the institute is to become a top think tank in the field of network security in China, comprehensively study the international situation, technology trends and industrial development, and find a unique development path. The Research Institute is a relatively neutral third-party institution, with the goal of "building a think tank, building a platform, promoting industry, and developing together", building a national network security industry exchange and cooperation platform, promoting the benign development of the network security industry ecology, bringing together the strengths of all parties, giving full play to the advantages of all parties, and contributing to the maintenance of China's cyberspace security.
Shen Changxiang, an academician of the Chinese Academy of Engineering, said that we should establish a safe and credible scientific concept of network security, build a network security guarantee system with active immunity and active defense, adhere to independent innovation, and promote safe and trustworthy network products and services in accordance with the requirements of the national network security laws, strategies and hierarchical protection systems, so as to build a solid defense line for network security. At the same time, it is necessary to concentrate the advantages of all parties to create a long-term mechanism for win-win cooperation and joint prevention and control, and promote the efficient, orderly and benign development of the network security industry.
Wang Zhengkun, deputy director of the Technology Industry Division of the Cyber Security Coordination Bureau of the Central Cyberspace Administration, pointed out that the current rapid development of the national network security technology industry has achieved gratifying results, but it should also be noted that the scale of China's network security industry is still relatively small, and the development of basic industries is still facing some prominent problems, and it is necessary for many parties to jointly promote the more benign and orderly development of the network security industry and consolidate the network security industry foundation for the construction and capacity building of the national network security guarantee system.
Fan Chunling, deputy director of the Network Security Protection Guidance Department of the Cyber Security Protection Bureau of the Ministry of Public Security, said that all parties in China attach great importance to and support the protection of critical information infrastructure, and the regulations on the protection of critical information infrastructure will be promulgated and implemented soon, and put forward clear provisions and requirements for the relevant content of critical information infrastructure involved in the network security grade protection system and the critical information infrastructure security protection system; in the follow-up process of promoting the protection of critical information infrastructure, a series of policies and standards will be introduced In this way, we will promote all industry departments and scientific research institutes to jointly strengthen the protection of critical information infrastructure.
Yu Kequn, director of the National Information Technology Security Research Center, put forward further suggestions on China's data security supervision and protection work. At the regulatory level, the idea of combining "filing, assessment, incident reporting and disclosure, inspection and investigation, and review" is put forward; at the protection level, it directly faces the special problems of data security, gives protection suggestions for the three core links of "where does the data come from, what to do with the data, and where does the data go", and puts forward the idea of "all-object protection, playing the role of certification, strengthening multi-perspective and multi-level standard formulation, compliance and technology combination"; at the industrial and technical level, it is emphasized that research and development and application should be vigorously developed and applied under the data security protection scenario" Automated processing, adaptive protection, systematic control and targeted protection" four types of technology.
"Industrial data security and supply chain security will be the next step in the development of the new direction." Hao Zhiqiang, deputy director of the National Industrial Information Security Development Research Center, believes that industrial data, as a new production factor resource, is becoming a new engine to promote quality change, efficiency change, and power change, and the role of driving the transformation and upgrading of the manufacturing industry is becoming increasingly prominent; industrial Internet supply chain security involves software and hardware products, equipment source code, component providers and manufacturers, etc. Once maliciously attacked, it will directly affect the normal operation of the industrial control system, and it is necessary to strengthen the management of the research and development, delivery and maintenance of industrial Internet products. Clarify the responsibilities and obligations of network security for different roles in the supply chain, and strengthen the protection of industrial Internet supply chain security.
Lu Xin, deputy director of the Office of the State Information Center, said that it is necessary to strengthen the cultivation, integration and activation of data elements to promote the further high-quality development of the digital economy. Lu Xin pointed out that the cultivation of data elements should not only further improve the construction of data infrastructure, but also further promote technological innovation; the integration of data elements, the most important thing is to promote the integration and development of the digital economy and the real economy; the activation of data elements is the result of the full integration of the digital economy and various fields of economy and society, promote the intelligence of various fields and aspects, and realize that data can speak, think and act. □ reporter Guo Qian reported from Beijing