China will build an important network facility security protection system

The national supervision of network security is gradually overweight. Recently, the country has started special legislation on national information security review, critical infrastructure protection and Internet information services. The first round of draft legislation has been closed to the industry. The most important is expected to be introduced next year. One of the important contents is that the next country will be expected to establish an important network facility security protection system and the State Council will formulate specific protection measures.

Understand that at present, for the work of network information security legislation, the relevant state departments have convened three major operators and Internet giants including Huawei, Ali, Tencent, Baidu, 360 to discuss and modify, the next step will be to seek public opinions.

It is worth noting that the establishment of a complete network facility security protection system has become the “top priority” for the next strategic layout. An authoritative expert in the industry revealed to reporters that the network information security legislation currently being revised will include network security strategy, planning and promotion of network operation security, network security monitoring, early warning and processing, among which the most important one is the state. It will provide basic information networks for public communications, radio and television transmission services, important industries such as energy, transportation, water conservancy, finance, and important information systems for public service such as power supply, water supply, medical care, etc. The government service network, the important network facilities owned or managed by the network service providers with a large number of users, implements a security level protection system, and the protection measures for important facilities security levels will be formulated by the State Council.

At present, the information security "black hole door" is shocking. Website attacks and exploits are developing in the direction of mass and scale. User privacy and rights are violated. In particular, some important data even flow to other countries, and information security threats have risen to national security. Level.

According to the monitoring of China Information Security Evaluation Center, from January to October 2014, the number of attacks on the national website reached more than 38,000. As of October, the relevant data showed an overall upward trend. A total of 2.8 billion malicious websites were found across the country. In 2014, there were more than 200 government websites with serious security risks. Many government websites were attacked and hacked by hacker organizations. Due to the illegal links, more than 300 government websites in China had security incidents.

According to data from the Tiantian Vulnerability Platform, from May 2014 to May 27, 2015, there were 247 vulnerabilities in the energy field, including 196 high-risk and 216 information leaks. The situation that was independently discovered and monitored by Tianyan Laboratory showed that in the APT attack named APT-C-00, the domestic infection volume was 1,047, from the ministries to the research institute, and then the following enterprises and institutions were all infected, covering 29 provinces across the country.

What is even more worrying is that an expert admits that in addition to website security vulnerabilities, departments including government enterprises and other data that have a large amount of private information, trade secrets, property security, etc., lack of effective supervision and accountability mechanisms, even if they appear Most of the information leakage problems are ignored, or the method of "squeaking the cover" is adopted, as long as it is not exposed.

“Regulations and legislation are more urgent.” Li Jian, chairman of Beijing Qimingle Investment Management Co., Ltd., said that the occurrence of the Snowden incident in the United States has brought the world’s attention to information security to a new level, along with “Internet +”. To become a new impetus for China's economic development, the security of information transmission and dissemination is particularly important.

Cao Yue, an expert at the National Information Technology Security Research Center, said that in recent years, China's informatization has developed very rapidly. At the same time, the corresponding network security laws and regulations are lagging and misplaced. In terms of cyberspace security legislation, the core part is the national critical infrastructure, especially the implementation of information security review systems for important information technology products and services used in systems related to national security and public safety interests, targeting finance, energy, health care, taxation, Industry information such as finances involving major public interests should be given special protection. He believes that once the legislation is regulated, it will be good for the security industry, and the problem of "industry fragmentation" will also be improved.

As information security rises to the national strategic level, the information security industry will also face a “golden period” of development. Many analysts believe that information security is in a period of rapid development. It is expected that the compound growth rate of the industry will reach 30% in the next few years. The favorable policy will further promote the industry's prosperity. In this context, network security leading enterprises are expected to become the next step of capital, in addition to Google's independent research and development of security products, ready to enter the security industry through smart home; Alibaba acquired security company Han Haiyuan; Baidu acquired security treasure to supplement its cloud protection system; In addition to the launch of specialized enterprise security products, Tencent and Venus Star, 360, Tencent, Ali and other giants have also rushed to the information security field.

Hybrid Adapter

Hybrid Adapter

ShenZhen JunJin Technology Co.,Ltd , https://www.jjtcl.com

Posted on