The integration of three networks has been what people in the information age have been looking forward to for many years. The integration of three networks can combine the last "one kilometer" line connecting users into one ("three" refers to telephone, television, and the Internet). Especially today when 3G technology is becoming increasingly popular, the integration of three networks can enable users to feel the integration and unification of the network anytime and anywhere. More importantly, the integration of three networks can integrate people's life, work, and entertainment methods, making mobile phones, televisions, and computers display screens that can be switched at any time, allowing the virtual network world to accompany users in the real world...
However, while people are enjoying the convenient information services brought by the integration of the three networks, its back-end operation system, supervision system, and maintenance system are also facing unprecedented challenges, among which the challenges of network and information security are the most urgent. This is not difficult to understand. Just imagine: under the integration of the three networks, information and network channels are more diverse and complex. In this case, users' various important and sensitive information needs double network security and information security protection. This is enough to be explained by information from hackers and security vendors, and from information from various security incidents in the field of science and technology and society.
In general, the security issues faced by the integration of three networks are mainly manifested in the following aspects:
First, the Internet is an emerging interactive platform technology that connects all regions on the earth. At present, people do not have enough ways to deal with the insecurity factors from the Internet. This is a reality. The integration of the three networks means that the country's media propaganda will face the same security status as the Internet. How to ensure the media's broadcast control?
2. The characteristic of the Internet is public participation. News release channels are no longer fixed and controllable. How can we control and protect against the release and dissemination of false and sensitive information?
3. Communications are like the "nervous" system of modern society and have become a national public infrastructure related to people's livelihood. Attacking the communications system is no longer just a political or national security issue, but a major livelihood issue related to social stability. How can we protect this huge network?
Fourth, of course, the core of the security problem is the security of the content, which is also the most headache for the relevant management departments and the problem that needs to be solved urgently. What cannot be made public is, at the most, state secrets, at the most, personal privacy; what cannot be said casually is, at the most, political speech, at the most, personal information. Only when these problems are solved well can the government and users enjoy the convenience brought by the information technology revolution with peace of mind.
To this end, as a leading company in the field of domestic information security, Venustech proposed the "vase" model, which demonstrates the design ideas for the network and information security architecture under the integration of three networks. Its main idea is to establish three security baselines of protection, monitoring, and trust, select security measures that are compatible with business needs, and form a three-dimensional and time-effective network security protection system. The details are as follows:
1. Protection system: Adopting the idea of "boundary", gateways and control devices are deployed at the interface between the network, system, resources and the "outside world". The model proposes five major boundaries: network boundary (LAN exit and security domain), human-machine boundary (server and terminal), and data exchange area;
2. Monitoring system: Using the idea of "camera", we can comprehensively monitor the viruses and Trojans, intrusions and anomalies, network traffic, device status, and application system status within the network, sense the dynamics of the network, and reduce possible losses to a minimum;
3. Trust system: Establish a reputation guarantee system for internal users to confirm that each person's work is compliant and legal. The core of the trust system is three verifications: first, verify the user's identity, then verify the user's authority, and finally audit and verify the user's behavior.
The above three security baselines complement and cooperate with each other. The level of each baseline should be balanced. The requirement of any baseline should not be missing or lowered, which will lead to security shortcomings (the so-called wooden barrel principle). Below the three security baselines is the public security support on the network, such as security management platform, patch management service, etc.
In summary, after the integration of the three networks, there are more types of services, flexible user access, and significant content security. In addition, social progress and people's choices will never wait until there is absolute security. There is no absolute security in the world; the greatest security is that we can grasp the overall dynamics at any time, have the ability to reduce the losses of local unsafe incidents to the minimum, and be able to control the situation is security.
Therefore, in the face of the integration of three networks, we need to strengthen the construction proportion of the monitoring system and the trust system, strengthen the awareness of the overall security situation, and establish an emergency guarantee system.
Previous article:Application of CAN-bus and PC in modern intelligent building community security
Next article:Application of Remote I/O Technology in Process Manufacturing Industry
Recommended ReadingLatest update time:2024-11-16 22:33
- Popular Resources
- Popular amplifiers
- Introduction to Internet of Things Engineering 2nd Edition (Gongyi Wu)
- Virtualization Technology Practice Guide - High-efficiency and low-cost solutions for small and medium-sized enterprises (Wang Chunhai)
- Investigation of occupancy perception in autonomous driving: An information fusion perspective
- 电磁矢量传感器阵列信号处理 (万群,邹麟,陈慧等著)
- MathWorks and NXP Collaborate to Launch Model-Based Design Toolbox for Battery Management Systems
- STMicroelectronics' advanced galvanically isolated gate driver STGAP3S provides flexible protection for IGBTs and SiC MOSFETs
- New diaphragm-free solid-state lithium battery technology is launched: the distance between the positive and negative electrodes is less than 0.000001 meters
- [“Source” Observe the Autumn Series] Application and testing of the next generation of semiconductor gallium oxide device photodetectors
- 采用自主设计封装,绝缘电阻显著提高!ROHM开发出更高电压xEV系统的SiC肖特基势垒二极管
- Will GaN replace SiC? PI's disruptive 1700V InnoMux2 is here to demonstrate
- From Isolation to the Third and a Half Generation: Understanding Naxinwei's Gate Driver IC in One Article
- The appeal of 48 V technology: importance, benefits and key factors in system-level applications
- Important breakthrough in recycling of used lithium-ion batteries
- Innolux's intelligent steer-by-wire solution makes cars smarter and safer
- 8051 MCU - Parity Check
- How to efficiently balance the sensitivity of tactile sensing interfaces
- What should I do if the servo motor shakes? What causes the servo motor to shake quickly?
- 【Brushless Motor】Analysis of three-phase BLDC motor and sharing of two popular development boards
- Midea Industrial Technology's subsidiaries Clou Electronics and Hekang New Energy jointly appeared at the Munich Battery Energy Storage Exhibition and Solar Energy Exhibition
- Guoxin Sichen | Application of ferroelectric memory PB85RS2MC in power battery management, with a capacity of 2M
- Analysis of common faults of frequency converter
- In a head-on competition with Qualcomm, what kind of cockpit products has Intel come up with?
- Dalian Rongke's all-vanadium liquid flow battery energy storage equipment industrialization project has entered the sprint stage before production
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
- [ESK32-360 Review] + OLED screen driver
- Open source development board CANPico
- Melexis High Reliability Programmable Hall Switch, you are invited to watch the live broadcast at 10:00 on May 21st
- Register for the live broadcast to win [bracelet, camera, umbrella, mobile phone holder] Rohde & Schwarz USB 3.2 conformance test
- Newbie question, please help! I just learned analog electronics and built a simple circuit using Multisim
- 【Zero Knowledge ESP8266】Tutorial: Mobile APP Control RGB LED
- The application of CAN bus data in automobile digital technology is the starting point
- TI AM335 Embedded Hardware Design Reference Guide OK335xD
- Infineon Position2Go Development Kit Review @2. Official Tools
- Application of ISP chips in edge computing