Reflections on Computer Data Security Concerns

Reflections on Computer Data Security Concerns Nowadays, when we talk about the spy bridges of various types of spy and warfare, we will certainly think of the prism door. It is not the name of the film. It was a real-life information spyware class that Edward C. Snowden, the former CIA staff member, gave us.

According to Snowden, US related intelligence agencies directly contacted users of the nine Internet companies, including Microsoft, Google, Facebook, Apple, Yahoo, etc., through the “Prism” internet information screening project to detect user behavior and easily monitor the world. It is not hard to imagine that when the people around the world entertain themselves and play social, office, or storage information products on the Internet products of well-known companies such as Google, Twitter, Facebook, Apple, etc., they will never think that their every move has already been informed by the United States. People look in the eyes and record it on the "core."

Although prismatic incidents have gradually cooled, cyber security issues are increasingly becoming the focus. As we all know, the United States has always had an absolute advantage in the field of information and communication technology. Most of the hardware and software equipment used by users in China comes from the United States. In the infrastructure related to government, customs, postal services, finance, railways, civil aviation, medical care, military, and other countries’ critical information, many large-scale application cases have also involved foreign companies. These are undoubtedly potential security issues in the domestic information field. Hidden danger.

Nowadays, data assets have become the company's core competitiveness. Once these data assets are compromised, they will bring major losses to the government, enterprises, and individuals. They can even reach the level of national security issues and enterprise survival. Take software as an example. For the purpose of serving users, general software companies will easily use the “back door” program to retrieve product usage data and user information. However, if these procedures are not used publicly, but operated in the background, or used for other business purposes, there will be a great security risk. Especially those who have important information in the design department and key areas, therefore, when large-scale foreign IT products and services began to enter all areas of China, stealing or peeking at key data abroad has naturally become a matter of course.

The future of war depends heavily on the security of network communications. When the acquisition, analysis, and mining of big data become the only way for the prism plan, the construction of information security is increasingly imperative.

Develop independent brands to support safe and controllable

At present, China has become a large country in the global electronic information industry. The scale of electronic information products manufacturing accounts for more than 30% of the global total. However, there is still a big gap between the overall technological level of China's electronic information industry and developed countries, and routers, switches, servers, operating systems, and core chips rely heavily on foreign countries. As the cornerstone of national development, information security is essentially part of national sovereignty. Only when independent innovation grasps key technologies and grasps the commanding heights of information security and realizes “localization” can it get rid of containment and enhance the core competitiveness of China’s entire information security industry.

So, how to achieve nationalization? How to protect your own information and data security?

In the long run, developing its own "autonomous and controllable" software and hardware platform is the basis of everything. Ni Guangnan, academician of the Chinese Academy of Engineering, pointed out that localization can first be “controlled independently”, which is of great significance for China’s national security. “In the current information age, security in various fields such as energy security, financial security, traffic safety, food safety, and environmental security... are all closely related to information security. It can be said that without information security there is no national security. To ensure information Security, especially in order to put an end to the 'back door', in order to be able to timely fix loopholes, the use of autonomous and controllable software and hardware is a prerequisite. They will not be maliciously set up 'back door', all of its source code can be thoroughly reviewed and tested by the relevant departments. Finding loopholes can be repaired in time, which can greatly enhance the security of information."

Then it develops on the basis of “autonomy and controllability” and it is “safe and credible”, which itself requires a process. Experts believe that national information security is a systematic project, and the country needs to put forward its overall strategy and objectives, and promote it in all aspects from the aspects of technology, management, policy, and law. Governments and enterprises should consider making cybersecurity legislation, replacing existing network equipment, and conducting security review of existing networks. These are all feasible methods. In addition, for the procurement of basic network construction and information applications, in order to avoid information leakage, users of the government industry should strictly follow the relevant national regulations and prioritize the use of domestically developed and designed products. This is not only in China but also international practice. .

Choosing "domestic" is not only a simple rule, but also a responsibility.

Promote national brands and demonstrate national responsibility

Challenges often coexist with opportunities. The “Prism Door” incident triggered a re-examination and recognition of information security by governments, businesses, and individuals in various countries. It also provided an opportunity for the development of ethnic enterprises.

According to the survey conducted by the Ministry of Information Industry, last year the domestic cyber security market maintained a rapid growth momentum, with the growth rate approaching 80%. Such a high growth rate has made the network security market increasingly fierce. In the next three years, China will have a market for network security products that exceeds 100 billion yuan. At the same time, the competition between domestic and foreign companies will become more intense. Under such circumstances, how will the national enterprises resist foreign companies’ strong offensives and step out of their own world? ?

The industry believes that national enterprises should seize the opportunity to grasp the market trend by adopting forward-looking understanding of technology trends and accurate judgments of actual needs of domestic users, and timely launch corresponding products. At the same time, they should provide customers with the most suitable and most cost-effective way. The product. Experts predict that in the next two to three years, the long-term monopoly era of foreign brands in key businesses in the fields of telecommunications and finance will surely come to an end. The products of national brands will also compete in the high-end fields with well-known foreign manufacturers. By then, the market share of national brands will continue to grow steadily. Only if the national information security industry grows stronger, will China's information security be truly guaranteed.

With the advancement of our country’s deployment of an autonomous and controllable information security system, China’s information industry has been vigorously innovating for more than ten years. Equipment produced by domestic manufacturers can be used as a substitute for foreign products, whether it is technology, quality or price. Replace foreign high-end products. Huawei switches are sold globally. Dawning's supercomputers are at the forefront of the world. The recognition of domestic software brands has also been increasing. Tsinghua Tongfang is the representative, and it is the earliest national IT enterprise to participate in the study of China's autonomous data encryption technology. The sense of national responsibility and the strong technical ability to protect the country’s critical information security have made important contributions to national information security and national economic informationization. At the same time, in the information security market, Tongfang’s big data industry places more emphasis on products or services with independent intellectual property rights to protect the country’s information security in the era of big data; there are also some local brands such as Kingsoft, Yongzhong, etc. All of them have achieved rapid growth. Products and technologies have been successfully applied in four national areas including the Central Organization Department, agriculture, water conservancy, and quality supervision, as well as government, military, finance, energy, manufacturing, and education industries. After ten years of development after China's accession to the WTO, China's electronic information product manufacturing industry accounts for more than 30% of the global total, and it has become a global leader in the electronic information industry.

It is undeniable that after years of development, national security companies have been tempered in long-term competition with foreign brands, and their own strength is becoming stronger. However, we should clearly understand that national security companies are in high-end products and safety. Services, etc., also have a certain gap with foreign companies. To solve this problem, ethnic enterprises must give full play to their own advantages.

According to expert analysis, domestic brands have great advantages in terms of product autonomy, service continuity, etc. In the future, national security companies should continue to uphold the principles of customer demand and application, increase capital and technology investment, and pay attention to ethnic groups. The R&D of intellectual property products and technologies, with localized technologies and services, enhances core competitiveness.

Increase support to break the bottleneck in the industry

After the “prism door” was revealed, how would the development of the industry meet with the Chinese software companies?

Based on the current situation of information security development, the industry believes that the protection of information security should focus on starting from the national key industry sectors, especially the national basic network and party and government special networks and other confidential information systems and energy, transportation, finance and other important information. Systems, key industrial control systems, etc. We will vigorously upgrade its informationization level, encourage and support the inclusion of information security products and services in the informationization budget, increase technological innovation, and establish long-term effective information security protection mechanisms. Specifically, make several suggestions:

The first is to develop key technologies for information security and key product R&D plans, to break through a number of information security core technologies and form a batch of products with market competitiveness.

Although after many years of development, our country’s information technology has achieved very good results and has also grown a large number of successful companies, but the situation in which core technologies are controlled by people has not been completely eliminated. Many domestic software vendors advocated to accelerate the R&D of domestic software, especially in certain key areas and key technologies. “Only by mastering the core technologies, will we not be controlled by people and minimize risks.” Innovation in core technologies is true innovation. We must encourage this kind of innovation, and SMEs are the source of innovation and the source of innovation. "Ni Guangnan said.

The second is to focus on the key technologies and key products that restrict the development of the information security industry, gather important national resources, establish and promote standards and norms for independent intellectual property rights, and build a complete information security product system and industrial chain. Through the help of the China Internet of Things Research and Development Center and the Zhongguancun IOT Industry Alliance, we will strengthen collaboration, innovation and linkage among enterprises, integrate and coordinate superior resources, and aim at R&D and breakthrough of common technologies and key technologies in the industry. The technological advantages of production, learning, research, and use of each link, collaborative innovation, and jointly promote the development of the industry.

Ethnic enterprises should assume the responsibility of escorting the information security of the national government, and fulfill their ambiguous oaths with their own practical actions. In the future, China will certainly get rid of the passive situation controlled by others in the field of information security. Ultimately, it will rely on domestically produced forces to achieve absolute security for China's self-occupation! ""

Our company is specialized in supplying  wire tube condenser,Fridge Condenser,refrigeratory condenser.Material: Bundy tube (steel tube coated with copper): 4x0.71mm,4.76 x 0.71mm ,6x0.71mm,6.35x0.71mm,8x0.71mm. Steel wire: 1-1.6mm . Copper filter driers . Structure: bundy tube with steel wire . Painting: electrophoretic painting (black) .We can supply the items according to customers' drawings or samples .Besides. we use the hydrolysis technique to ensure whether the condenser will not leak. Fridge condenser is very popular in the after sales market for freezers , coolers and refrigerators .

Fridge Condenser

Fridge Condenser,Condenser Refrigeration,Freezer Condenser,Refrigerator Condenser

ZHEJIANG ICE LOONG ENVIRONMENTAL SCI-TECH CO.,LTD. , https://www.china-refrigerantgas.com

This entry was posted in on