On the Network Security Technology by the Top Network Security Experts in the World
On the afternoon of September 19th, National Cyber Security Publicity Week held the first forum "Cyber Security Technology Summit Forum". The picture shows the forum site. China Netcom Network Jiao Peng photo
On the afternoon of September 19th, National Cyber Security Publicity Week held the first forum "Cyber Security Technology Summit Forum". The picture shows the forum site. China Netcom Network Jiao Peng photo
On the afternoon of September 19th, National Cyber Security Publicity Week held the first forum "Cyber Security Technology Summit Forum". The world’s top cyber security experts, such as Eugene Kaspersky, CEO of Kaspersky, Steve Martino, Chief Information Security Officer of Cisco, Shen Xiangyang, global executive vice president of Microsoft, Zhang Yong, CEO of Alibaba and Zhou Hongyi, chairman of 360 Company, expressed their opinions and shared their thoughts and suggestions on cyber security technology.
As the main forum of the National Cyber Security Publicity Week, the "Cyber Security Technology Summit Forum" is guided by the Central Network Information Office, hosted by the Wuhan Municipal People’s Government, and undertaken by China Internet Network Information Center, China Cyberspace Security Association, and Electronics No.1 Institute of the Ministry of Industry and Information Technology.
Yang Xueshan, former vice minister of the Ministry of Industry and Information Technology: The integration of the five major technologies will usher in an intelligent era within 15 years.
Regarding the long-term development trend of information technology, Yang Xueshan takes 2030 as the boundary, and thinks that information technology will show four characteristics. At present, the transmission and processing technology is maturing, and the physical technology and physical limit supporting its development are coming. The application in various fields of economy and society has also reached or is touching the ceiling. In the visible time, there is generally no new technology to replace it. But maturity does not mean completion, and there are still innovations.
Perception and behavior technology is in a period of rapid development. He believes that perceptual technology is the starting point and behavioral technology is the end point. How to make behavioral technology as mature as human brain commanding hands and feet, we still lack the support of theoretical basis. The content technology, that is, the familiar big data technology, is unevenly developed. Yang Xueshan introduced that the processing of digital data is mature, and it is entering a rapid development period for relatively simple digital data, text data and even some voice and video specific applications; The real audio and video processing can process digital, text, audio and video like a human brain. In this respect, we are still in the initial stage, which is the early stage of development. If the above five technologies are integrated to build a new system technology, it will become the most important content in the economic and social development in the next 15 years.
Academician Tsinghua University Wu Jianping: Cyberspace security is actually the competition of high-level talents.
Wu Jianping said that cyberspace is the fifth territory of mankind after land, sea, air and space. The challenge of cyberspace is mainly the challenge of Internet infrastructure security, which mainly includes the lack of source address, source address verification, large-scale network attacks, large-scale domain name hijacking and counterfeiting. Summarizing the characteristics of network security is that it is holistic rather than fragmented, dynamic rather than static, open rather than closed, relative rather than absolute, and global rather than independent.
Cyberspace security is actually the competition of high-level talents. Before 2013, there were 96 colleges and universities involved in information security. Generally speaking, high-level talents are the most urgent. At present, about 60 universities in the world have master’s degrees in cyberspace security, focusing on chip security and Internet infrastructure security. Cyberspace security has penetrated into all parts of cyberspace. Strengthening basic research and mastering core technologies in cyberspace is the key to solve cyberspace security. We should cultivate more high-level talents such as masters and doctors.
Zhang Yong, CEO of Alibaba Group: Prepare for the next vent.
Zhang Yong said, from the beginning, safety has been our greatest concern. However, with the development of the whole information technology and the wide application of big data in life, network security cannot be prevented by defense alone, and the lasting vitality of security comes from attack. The most important thing is to be able to use big data and the technology we have mastered to trace and trace the upstream of the black and gray industrial chain. Only in this way can our industry and consumers be truly safe.
The development of information technology is changing with each passing day. While many people are still discussing privacy protection and mobile security, in fact, various emerging technologies such as artificial intelligence, intelligent manufacturing, voice and image recognition are developing rapidly, and the security of the Internet of Things has become the next vent. Safety technology and protection must not be static. In this process, how can we predict the next tuyere in advance and prepare for the next tuyere is very important.
Shen Xiangyang, global executive vice president of Microsoft: Trustworthy technology and security are the foundation when the fourth industrial revolution comes.
Shen Xiangyang said that security and trust are becoming more and more important. With the development of information technology, we are welcoming the fourth industrial revolution, which will mainly focus on three types of technologies. The first type of technology is the development of the material field, including new materials, self-driving cars, robots, 3D printing, etc. The second category is the sustainable development of the biological field, in which technologies such as genetic testing and genetic engineering are not only helpful to human health but also to the development of agriculture and animal husbandry; The third category is the development of digital technology, which will affect everyone. Therefore, trustworthy technology and safety are the foundation for us to move towards the fourth industrial revolution. Shen Xiangyang said that in the past, we separated the physical space from the digital world, and now we know that the digital world is changing our physical life. In today’s world, there is no national security without network security. We not only live in a world of diversified technologies, but also live in an era when Internet security challenges. European governments have launched network security guidelines to protect infrastructure.
Zhou Hongyi, Chairman of 360 Company: The accuracy of fraudulent SMS is improving. It is suggested to speed up the legislation of personal information protection.
Zhou Hongyi said that some time ago, the media reported more news about the death of Shandong college students by phone fraud. Why is communication fraud so easy to succeed? On the surface, fraud is the result, but the reason behind it is the disclosure of personal information. Since the beginning of this year, many people feel that the accuracy of receiving fraudulent text messages has been greatly improved. In the past, fraudulent text messages were sent in groups. Now he knows your name and is easily deceived. At present, more and more websites have real data and information of users, but there are obvious loopholes in security protection. It is suggested that the state strengthen legislation in this regard.
Steve Martino, Chief Information Security Officer of Cisco: There are five magic weapons to solve cyber threats.
Regarding how to protect the network security of enterprises, Steve Martino said that there are five magic weapons to win. The first magic weapon is the need for an "architect". Enterprises need a comprehensive network security governance and operation system, and they need to look at their identity from a higher angle to start the most comprehensive protection. Everything is like a complete building, interlocking. The second magic weapon is education, and all employees will receive relevant education regularly, thus greatly reducing the bad influence brought by phishing websites. Thirdly, network security is as important as operational performance. We are very concerned about our performance, but we often regard network security as the second most important thing, which is wrong. With architects, we need a complete epidemic prevention system. Architects understand all the components and how they cooperate with each other. Security experts use the latest technology to stop threats, but if all departments do not communicate, the network crisis will not be solved quickly. Finally, a very adaptable and flexible defense system is needed.
Ding Lieyun, academician of China Academy of Engineering and president of Huazhong University of Science and Technology: If information technology is not transformed, it will melt like a popsicle.
Ding Lieyun said that in the past two decades, in the information field, the mode of transformation of university achievements has been continuously upgraded, and the related information security achievements formed by universities have made breakthroughs in a certain field. However, very few of them went it alone in the market, and most of them took the form of achievements transfer or shareholding, and the achievements could not get out of the ivory tower because they were "blocked" on the road of transformation.
The original innovation ability is insufficient, and the poor connection between science and technology and economy has become a "blocking point". Ding Lieyun believes that the way to unblock traffic congestion lies in promoting the establishment of a collaborative innovation system integrating politics and Industry-University-Research. The government should build a platform and make overall plans for R&D activities. The country must have grand planning and overall design to comprehensively coordinate the research and development of important links in the information technology system, build an open technology ecology and create an effective means of technology ecology. At the same time, original innovation should be combined with integrated innovation. Enterprises should summon up courage to advance into the deep-water area of technology, no longer be limited to the innovation of information technology and security technology at the application level, aim at the national strategic needs, focus on the key breakthroughs at the infrastructure level, create a safe and independent information platform, and break through the technical barriers of multidisciplinary and multi-dimensional; Universities need multi-field technical cooperation breakthrough, and multi-disciplinary crossing is the inherent advantage of universities. To strengthen interdisciplinary crossing, we must have ideological innovation and institutional innovation at the same time, and speed up the last mile of improving the transformation of achievements; Although there are risks, there are more opportunities for breakthrough and decisive innovation. Finally, capital should have foresight to cooperate with innovation.
Li Jiancheng, Academician of China Academy of Engineering and Vice President of Wuhan University: Network security construction is based on law and technology.
Li Jiancheng said that Tsinghua University teachers were cheated, Song Zhenning’s case and other frauds in the media have hidden huge personal privacy leaks. However, "data openness" and "information security" are two sides of the same coin. In the era of big data drive, new resources, new thinking and new technologies have shaped new industries, spawned new occupations and created a new era. However, when big data is opened and data is released anytime and anywhere, it may also be attacked by hackers anytime and anywhere.
So where does big data go under cyberspace security? Li Jiancheng suggested that law is the foundation, and management and technology are the support. Cyberspace security law needs to be promulgated urgently, and cyberspace security management rules and regulations need to be promulgated urgently. Law and technology are equally important in big data and information security. "
Yang Debin, Director of the Office of the Chief Information Officer of the Hong Kong Government: Inform the network security information in time and defend against it early. Smart city products are designed with safety as the source.
Yang Debin said that the penetration rate of broadband services and smart phones in Hong Kong has reached 84%. In terms of digital and personal safety, Hong Kong ranks fourth and sixth respectively in the world. At present, the types of threats to network security in Hong Kong include malicious software, advanced network attacks and denial of service attacks. In the future, the development of smart cities and the realization of smart transportation, smart medical care, smart power grid and smart home through the Internet of Things will not only bring convenience to life, but also aggravate the network security problem.
Yang Debin shared several ways to improve network security: the first is to inform each other of network security information in time through people-to-people, government-to-government, and government-to-people, so as to prevent and resist some behaviors that affect network security as soon as possible. Second, enterprises need to take diversified protection work, not only a protective wall, or encryption, or backup, but also more knowledge and awareness training in employee training. In addition, in view of the new technology, all kinds of products developed in smart cities should take safety as the source of design. Different products must take all safety into account when designing, so as to achieve that all products can have methods to defend themselves from hackers and effectively resist them. In addition, it is necessary to strengthen the awareness of network security of netizens through seminars, publicity and schools.
Jeremy Benn Flem, global vice president of Israeli Checkpoint Company: 4 The attack sounded the alarm and network security has risen to the national level.
Remy Ben Flem mentioned that there are four typical cases of being attacked in the history of network security: one is Ukrainian power outage, which is caused by malicious code; Second, in the Central Bank of Bangladesh, attackers sent phishing emails to bank staff, stole terminal passwords, and transferred money between banks in the Philippines; Third, the arrival and departure stations of Hanoi and Ho Chi Minh City airports in Vietnam were attacked, which paralyzed the airports. Fourth, a chain hospital in Maryland was blackmailed and more than 1000 patients’ appointments were cancelled.
Remy Benn Flem said that at present, physical safety can be well guarded, such as not letting anyone near our airport. But we should also see other factors, such as the instrument landing system. If you turn it off, the whole airport will be paralyzed, as well as the baggage system and ticketing system, which are vulnerable to attacks. Therefore, the future defense system will also be multi-layered. He believes that the current network security has risen to the national level. But to be one step ahead, the first thing is architecture, like an architect, to ensure its consistency; The second is defense, not only detection and discovery, but defense before the attack, which is very difficult; The third is automation, with an early warning system.
Zeng Anye, President of Chow Tai Fook Group: To improve the national cyber security capability, it is necessary to get through all links and unite talents with each other.
This year, Chow Tai Fook donated 300 million yuan to set up a cyber security fund. Under the guidance of the Central Network Information Office and the Ministry of Education, the fund is mainly used to reward outstanding cyber security talents, excellent teachers and excellent teaching materials, and support the training of cyber security talents. We believe that to enhance the national cyber security capability, we not only need the government’s strong support from education, scientific research and industry, but more importantly, we need to get talents from all links to unite with each other and build a complete cyber security ecological chain. In this process, we should pay special attention to giving full play to the role of enterprises and social capital and mobilize the enthusiasm of all parties. (China Netcom Su Ying)