Information Security News mailing list archives

State responsibility for network security


From: InfoSec News <alerts () infosecnews org>
Date: Tue, 1 Oct 2013 05:57:01 +0000 (UTC)

http://www.qstheory.cn/kj/yjsk/201309/t20130930_275945.htm

[Translated by Google   - WK]

By Wang Minghua
China Science News
2013.09.30

National cyberspace security responsibilities can be divided into four parts: the national defense, space management, network diplomacy, comprehensive deterrence.

Cyberspace security is mainly reflected in two aspects, one is the network level, two levels of information, namely, information protection and information regulation. Network level is divided into two angles of attack and defense, so the network level, including network defense and network deterrence.

The first half of this year, according to sample monitoring found that China was controlled by Trojans and botnets hosts reached 693 million units, although this figure has dropped significantly over last year, but still very alarming. More than 600 million computers in the end is which machines to control it? Most control servers are located outside, 15,000 Trojans and botnets control server, the United States addresses accounted for 1/3. Our country has a large number of websites have been implanted "back door", "dark chain" and other covert attacks. Overseas 16000 IP via implanted "back door" way of controlling our 33000 sites, a very large number.

This year on August 25 morning, the country. Cn domain suffered large-scale attacks, resulting in Sina microblogging not work properly. Attacker's intention is to attack a game PW domain, to achieve their own ends. A few days ago the hacker has been arrested in Qingdao, Shandong.

This is the year occurred a typical network events. Well, the state of network security incidents in these what are my responsibilities? State, enterprises and individuals how to divide responsibilities?

If the attacker is a hacker organization, and involves the national government or critical infrastructure defense only when the need for national defense; if the attacker is a national, attack objects whether government, business or personal, this time the defender must be a national power.

State assumes responsibility related network security What level? If the attacker is a common hacker attacks targeted individuals, small audience, as cold as the individual who who treat colds. If the attacker is a hacker organization, the object is a personal attack, the audience more, like the flu, the state needs concerns. If the attack target is a national, even personal, like SARS, as the nation will start senior response.

National cyberspace security responsibilities can be divided into four parts:

The first is national defense, mainly for foreign organized on the overall operation of the Internet in China, critical infrastructure and national security threat defense; second is the spatial governance to safeguard China's economic development as a starting point, causing large-scale damage to the interests of users and impact of the operational security of critical infrastructure to handle the event and coordination; third is the network diplomacy, the need to establish a broad network security mechanisms for cross-border cooperation in the international manifestation of our right to speak and influence; fourth is a comprehensive deterrence, enhance our monitoring their ability to build defensive tools and ability to make others afraid, you can not attack us.

This is the state assumes responsibility for the four aspects. Of course, the state requires specific entities assume responsibility, China has such a principle, who is in charge who is responsible, who operate who is responsible, who is who is responsible for access. When the network security incidents occurred in which the entity, specifically in relation to who is responsible.

Currently, our overall network security environment there are many problems. For example, in business, industry level, many of the security company's products are difficult to integrate, it is difficult to form together; in the academic research community, the security of our country the number of papers published has been ranked first in the world, but the article and more, use less, the lack of guidelines and Prospects .

In such circumstances, China's urgent need to establish a comprehensive security ecosystem, hoping national cyberspace, governments, businesses, organizations and individuals in the network security and defense can be a positive interaction, thereby forming a self-running, self-improvement and self-cycle organic whole. In a virtuous cycle, so that every aspect of every business in which their most valuable form of a ring, to form a good ecological chain.

(Author: National Internet Emergency Center Operations Management Division Director)



--
Find the best InfoSec talent without breaking your
recruiting budget! Post a Job, $99 for 31 days.
Hot InfoSec Jobs - http://www.hotinfosecjobs.com/


Current thread: