"While we were born in a professional research institute, it is more like an old locksmith in the mountains." Zhang Jianjun said with a smile. As the deputy chief engineer of the 30th Research Institute of China Electronics Technology Group Corporation, Zhang Jianjun is familiar with information security technology.
"The old locksmith is selling locks. I used locks to install the security door first. So in order to sell the locks, we started to make security doors. We found that the houses were all thatched houses, the security doors were installed, and the house collapsed, so we started Building a concrete house. When the house is built, we have become a property company in order to make our customers live comfortably.†Zhang Jianjun explained his work, from selling locks to installing security doors, building houses and doing property. Information security technology provides a full range of services, from a single product like a cryptographic machine to the entire lifecycle protection and maintenance of the entire information security engineering protection product.
In the process of users' use of information security products, there are always some interesting phenomena in the process of users' deep understanding of information security concepts: for example, some people put the security door in the bathroom - the user No protection is built on what is most needed to protect. For example, someone installed a security door, but hangs the key on the door, lacking sufficient information security awareness. "Information security is not a function of the purchase, it is not a drug that is immediately effective. More often, it is more like a health care drug." Zhang Jianjun said.
Not long ago, the National Information Security Vulnerability Sharing Platform (CNVD) issued a notice of the "heart drop" of a high-risk vulnerability in memory information disclosure. Due to the wide range of OpenSSL applications, government agencies, university websites, financial securities, e-commerce, online payment, instant messaging software, mail systems and many other service providers are affected by this vulnerability, and Internet users' personal information and property security are challenged.
"Heart bleeding" was first discovered by a research team at Google and a Finnish security company. It is considered to be one of the most influential and most serious network vulnerabilities in recent years. It is understood that this security vulnerability has actually existed for more than two years. This means that in the past two years, the personal information of Internet users is actually at risk. To some extent, these four words are the "nightmare" of technicians working in cybersecurity.
More seriously, this danger is not known to a single user. Zhang Jianjun once had a "difficult" customer. Initially, he wanted to talk about cooperation but failed, and it was difficult to break through. In the "May 1" holiday, the company's machine suddenly became infected with a virus and could not function normally. The customer thought of Zhang Jianjun and came to ask for help. Zhang Jianjun led the information security personnel to find the problem on May 1, and made the virus killing tool on the 2nd. It was submitted on the 3rd. On the 4th, the company went to work normally, and did not constitute any loss. This time, the experience of the accident has laid the foundation for the two cooperations. "We have signed several orders of more than 10 million grades," said Zhang Jianjun.
“It’s hard to imagine a big company with a lot of user data leaking out user information.†Zhang Jianjun said, “It’s no exaggeration, the information disclosed by a person’s mobile phone is enough to trap himself.†Through a series of data analysis The user habits of mobile phone holders are fully demonstrated. If someone is trying to get rid of it, it is easy to set a trap.
Zhang Jianjun therefore called for legal protection and moral constraints. For example, how to solve the problem of transaction forensics for the emerging Internet finance? In the event of a problem, how do you prove that it is the responsibility of the user or the responsibility of the service provider? In the case of a user in a weak position, a service requiring third-party evidence preservation and proof of responsibility is required.
Zhou Hongren, executive deputy director of the National Informatization Expert Advisory Committee, raised the hidden worries behind the network boom at the high-level seminar on experts in the informationization situation. In recent years, China's informationization public opinion field has been hot, such as cloud computing, Internet of Things, smart earth, smart city, smart phone, 3D printing, the third industrial revolution, big data and so on. China seems to have become the wave of the wave of global informationization, and is chasing the world trend. However, we should keep in mind that the development of China's informatization must proceed from the reality of China's economic and social development and informatization development, and we must not blindly pursue the wind; otherwise, we may become blind drummers and promoters of foreign technology and products. Misleading Chinese companies and users has led China's ICT industry to go astray.
Demand-led, rather than technology-led, is an iron law for informationization. Violation of this iron law, the development of information technology will certainly go astray. China's informatization must be demand-driven, serving the process of China's modernization and urgent needs, and should not be technology-driven. In order to adopt or develop a certain technology and promote the so-called informatization, without first thinking about the urgent need of this technology to solve national or local economic and social development, it may have taken a direction. "In the past few years, the technology-driven phenomenon in China's informationization is very obvious and worrying." Zhou Hongren said.
The significance and value of big data is beyond doubt. Recognizing the advent of the data age is actually more important than big data itself. Because the advent of the era of big data is the advent of the data age, and it is also the arrival of "data" as a "resource" era. Sixty years ago, Wiener, the founder of cybernetics, pointed out that information is as important as matter and energy. It is one of the three major elements that make up the objective world and one of the three major resources of human society. The true meaning of this assertion is not difficult to understand only in today's data age. However, resources need to be developed. Like a copper mine, without development, copper mines do not automatically turn into copper. The process of information resource development is the process of informationization. "Digitalization" has opened up new modes, new technologies and new methods for the development and utilization of information resources in the information age. However, in the face of development, the "tightening" of security needs to be kept in mind.
Zysen offers Lumped Power divider(Combiner), Freq. Range from 1MHz to 6000MHz, Coaxial, surface mount, plug-in type available, Power 1W max. Frequency band can be customized, contact us with your requirement.
Lumped Power Divider,Waveguide Power Divider,High Power Rf Combiner,Microwave Power Divider
Chengdu Zysen Technology Co., Ltd. , https://www.zysenmw.com