In the era of big data, the innovation and development of new technologies put forward new requirements for network and information security. It is increasingly important to mine and analyze information security vulnerabilities and comprehensively manage network security risks.
Beijing (CNFIN. Com/xinhua08.com)-The English fable "A nail damages a horse, and a horse loses its social status" is alarming. In the field of network and information security, the possibility of "one hole damages one network, and one network loses the overall situation" also exists. In the era of big data, the innovation and development of new technologies put forward new requirements for network and information security. It is increasingly important to mine and analyze information security vulnerabilities and comprehensively manage network security risks.
At the 8th Information Security Vulnerability Analysis and Risk Assessment Conference held on 23rd, the national information security authorities, experts, scholars and business representatives conducted in-depth discussions on the theme of "Vulnerability Analysis and Risk Assessment Technology in Big Data Era" and shared theoretical, methodological, technical and practical achievements. The industry pointed out that the impact of high-risk vulnerabilities such as heart bleeding on users around the world a year ago has not been eliminated. This year, the two major operating systems, Android and Apple, respectively exposed major vulnerabilities, and user privacy and sensitive data were at risk. The omission of 1% may lead to the failure of 100%, so it is urgent to strengthen vulnerability analysis and information enjoyment.
Hu Xiao, deputy director of the Network Security Coordination Bureau of the Central Network Information Office, said that vulnerability analysis and evaluation is an important work of network security. Strengthening vulnerability analysis and technical detection, comprehensively evaluating the possible risks of key information infrastructure, finding vulnerabilities in time and eliminating hidden dangers are the key to the construction of national network security protection and the important place to ensure national network security.
In recent years, China has made great progress in network security vulnerability analysis and risk assessment. China National Information Security Vulnerability Database (CNNVD) based on vulnerability data has been built, a national and industry-level security inspection system has been established, and a national security team has been formed to conduct regular security inspections on networks and important systems involving people's livelihood, thus eliminating a number of major vulnerabilities and security risks in time and effectively controlling network security risks. However, the road is one foot high and the magic is ten feet high. Vulnerability analysis and risk assessment still need the joint efforts of the government and scientific research institutions, and also need to be further improved in vulnerability resource management and information security.
Director Zhu Shengtao of China Information Security Evaluation Center put forward three suggestions: First, strive to raise the comprehensive control of various resources to a new height of information security strategy as soon as possible; Second, make unremitting efforts to make institutionalized and legalized risk assessment the new normal of information security as soon as possible; Third, Qi Xin should make concerted efforts to exchange cooperation experience on loopholes and potential risks with all sectors of society, so as to promote a new dimension.
Fang Xing, a security expert of Alibaba Group, and Wu Yunkun, president of 360 Enterprise Security Group, mentioned the concept of "threat intelligence" many times, and discussed how to strengthen the ability of collecting and mining, strengthen the construction of threat intelligence system, improve the level of strategic intelligence prediction, and help network emergency response. The 8th Information Security Vulnerability Analysis and Risk Assessment Conference was hosted by China Information Security Assessment Center, hosted by Beijing Jiaotong University and co-organized by Tsinghua University. At the same time, the awarding ceremony of the third batch of *** 13 technical support units of China National Information Security Vulnerability Database was held. Among them, CLP Great Wall Internet System Application Co., Ltd., Beijing Yun Jian Youdao Technology Co., Ltd. and Beijing Jiangnan Tianan Technology Co., Ltd. were awarded the title of the first-class support unit of the National Information Security Vulnerability Database together with the nine previously approved enterprises.
The above is what Bian Xiao shared with you about the necessity of strengthening vulnerability analysis and risk assessment in the era of big data. For more information, you can pay attention to Global Ivy and share more dry goods.