Loading...

Table of Content

    10 October 2020, Volume 6 Issue 10
    Overview of independent ecological construction of information industry
    2020, 6(10):  0-0. 
    Asbtract ( )   PDF (944KB) ( )  
    Related Articles | Metrics
    The independent ecological construction of information industry is the foundation for the continuous development and growth of China's information industry. This paper analyzes the current situation of localization development of information industry products, summarizes the definition and characteristics of narrow sense and broad sense ecology of information industry, introduces the development ideas of ecological construction of information industry, proposes the independent ecological construction plan of information industry, and puts forward the construction ideas from five aspects, including the construction of technology and standard system, industrialization system, management system, service system and talent cultivation system, pointing out the research direction for promoting the localization project of information industry and independent ecological construction.
    Discussion on Network Security Operation and Incident Automatic Disposal Technology for Domestic Product Ecology
    2020, 6(10):  0-0. 
    Asbtract ( )   PDF (1408KB) ( )  
    Related Articles | Metrics
    With the increasingly complex and serious of the international situation, it’ urgent for China to develop basic software and hardware products and their ecological industrial chain based on autonomy and control. The improvement of the industrial chain has promoted the widespread promotion of network localization alternative projects. For a long time, cyber security incidents such as external cyber-attacks and internal threats have occurred frequently. It is a hot issue for network operators how to fully integrate the advantages of the independent and controllable industrial chain, and improve the ability of network security operation and incident disposal. This paper will combine the domestic product ecology and the characteristics of network construction, discuss the key technologies of network security operation and automatic event disposal mechanism technology, build multi-source data fusion between management ability as well as ecological products within the coordinated ability, solve the long-term problems of data fragmentation and low efficiency of event disposal, realize the comprehensive analysis of security incidents as well as efficient automatic response and disposal, and enhance the network security operation ability of domestic product ecology.
    The Problems and Countermeasure of Localizaiton Ecosystem Development of Overall-unit Manufacturing
    2020, 6(10):  0-0. 
    Asbtract ( )   PDF (1361KB) ( )  
    Related Articles | Metrics
    In recent years, manufacturers of the CPU, operating system, middleware, database and application software have been working hard to improve their independent controllability in the field of information technology application innovation (referred to as "Xinchuang"), applying and developing not only in offices, but also in finance, telecommunications and so on. The whole Xinchuang system involves the coordination and integration of the industry chain such as CPU, BIOS, basic software, application software, etc. It requires a lot of compatible adaptation, test verification and optimization. Up to now, more than 100 types of software has been adapted at least, including office software, tool software, instant messaging, development environment, browser, etc. During the process, many problems were exposed. The ability of product quality control was insufficient. Each manufacturer's own system, which was relatively closed, "played its own way". The ecological traction of user-end was lacked. The division of industrial chain was not perfect. Aiming at above problems, it is urgently necessary for users, manufacturers and other parties to synergy effectively , to form overall solutions as soon as possible based on the specific need, to build more adaptation platforms and laboratories for strengthening R&D, production and operating capacity, to promote the standardization of production and quality, in order to finally build a mature Xinchuang ecosystem.
    The Ecological Development of Domestic CPU Through the Perspective of Phytium
    2020, 6(10):  0-0. 
    Asbtract ( )   PDF (2247KB) ( )  
    Related Articles | Metrics
    CPU is a special field in integrated circuit industry, which has high technical barriers and complex implementation, especially, the success of CPU industrialization is extremely depends on ecology. CPU ecology refers to a collaborative, compatible and standardized collaboration system formed between enterprises in the CPU industry chain and between enterprises and users, it can be understood as running on the CPU and the whole machine based on the CPU, related software and hardware applications. Therefore, the role of ecology is very prominent in the CPU market. At present, facing different market fields, Chinese domestic CPU manufacturers have different R&D foundations and technical styles, but they basically follow their own development routes, actively invest in new product research and development, strive to open up the market, cultivate the ecological system and strive for extensive cooperation in the domestic and foreign industrial chains. This article introduce Phytium’s product line, the full-stack solutions of terminal equipment and cloud computing, the basic status of Phytium in ecological construction, analyzes the difficulties in ecological development, and development plans in the next few years. Make policy recommendations to deal with common problems in the ecological development of Chinese domestic CPU.
    Analysis on the Current Situation of Domestic Operating System Ecosystem Construction
    2020, 6(10):  0-0. 
    Asbtract ( )   PDF (1372KB) ( )  
    Related Articles | Metrics
    Although China's information technology product ecosystem has initially taken shape, it products can meet the most basic application requirements of some key fields and important information systems, and basically have the ability to replace Wintel system. However, the mainstream operating systems such as windows have formed a high ecological barrier. It is difficult for the domestic operating system industry to develop ecological chain, and the ecological fragmentation is seriously to be solved. From the perspective of ecological construction, this paper analyzes the current situation and existing problems of domestic operating system ecological development, and puts forward measures and suggestions to promote the ecological construction of operating system combined with the actual development of China.
    E-Government Localization Application Enabling Information Technology Innovation Ecology
    2020, 6(10):  0-0. 
    Asbtract ( )   PDF (2491KB) ( )  
    Related Articles | Metrics
    In recent years, with the rapid development of China's e-government, facing the unpredictable international political and economic environment and increasingly severe network security situation, the localization of E-government has become the inevitable requirement of government information construction. In the process of e-government localization, we should define the information technology system with application as the traction software, promote the maturity of basic software and hardware, and comprehensively build a safe and efficient localization information technology system. It is proposed to solve the existing problems in the application of e-government localization through the comprehensive construction of comprehensive support system, improvement of user experience and construction of talent training system. The total integration methodology is used to endow the quality and effectiveness of localization project, and finally realize the whole process visual management, so as to create the localization industry ecology and jointly promote the development of China's e-government information innovation industry.
    Research on the Training System of Network Security Engineer's Innovation Ability
    2020, 6(10):  0-0. 
    Asbtract ( )   PDF (1490KB) ( )  
    Related Articles | Metrics
    Innovation ability is the basic characteristic of contemporary engineers, and also an important symbol of outstanding engineers. This paper mainly discusses the innovation ability and its elements of network security engineers, and how to cultivate the innovation ability. Starting from the establishment of training objectives and standards of network security engineers, we put forward a network security engineer training system with engineering practice ability and innovation ability as the core, and specifically studied the talent training pattern of "multi-party collaboration" that is suitable for training the innovative ability of network security engineers, and took "ability center" as the guidance of personnel training mechanism, institutional environment, international exchange platform and campus culture. This training practice shows that the training system is feasible and has achieved good results in the training of network security outstanding engineers in our university.
    The Challenges and Suggestions for the Development of Digital Economy
    2020, 6(10):  0-0. 
    Asbtract ( )   PDF (846KB) ( )  
    Related Articles | Metrics
    Digital economy has become the new engine of global economic development, the world's major countries strive to develop the digital economy for stimulating economic growth, China has paid high attention to the development of digital economy and introduced a series of policy measures.The digital economy of China has developed rapidly, which has become an important part of economic development and provided new momentum for the economic growth. However, with the application of emerging technologies, the expansion of network boundaries, the growth of data resources and other new trends, the development of digital economy is also facing challenges, such as the slow pace of digital upgrading of traditional industries, cyber attacks on critical information infrastructure, increased difficulty in preventing privacy leaks and data abuse, and the continuous emergence of new technologies and security risks. This paper puts forward relevant suggestions such as overall coordinating the digital upgrading of traditional industries, strengthening system protection of critical information infrastructure, taking multiple measures to strengthen data protection, and extending application evaluation for emerging technologies, so as to provide support for the high-quality development of digital economy.
    Survey of Blockchain Technology Development and its Applications in Government
    2020, 6(10):  0-0. 
    Asbtract ( )   PDF (1599KB) ( )  
    Related Articles | Metrics
    Blockchain is an important milestone in the development of cryptographic technology, Its technical characteristics and advantages subvert the traditional management thinking and governance model, It's conducive to promote the reconstruction and optimization of trust model and management mechanism, and provides experience and enlightenment for the establishment of a new government data governance system. This paper gives a comprehensive review of the origin, evolution, development and rise of blockchain technology. Examine its core ideas and design concepts, and summarizes and evaluates its core technology, element rules and infrastructure. We take official document circulation, information resources directory and online government services as example, this paper expounds the typical scenarios of its application in government from the perspective of use case design. Summarize the vision, problems and reasons of the application of block chain technology in government, and puts forward some directional thinking and prospects.
    The Choice of Scenario Theory of Data Ownership —Refutation based on Dualism
    2020, 6(10):  0-0. 
    Asbtract ( )   PDF (1896KB) ( )  
    Related Articles | Metrics
    At present, the discussion of data ownership presents a scene of contention among hundreds of schools. Through analysis, it can be found that many viewpoints hope to build the data ownership problem on the basis of binary opposition category. However, the closed category caused by binary opposition is also the premise error of theoretical discussion and judicial practice neglecting data regulation, the scene of data right attribute judgment and the logic of public-private interest structural contradiction on data Edit start point. In the future, it is a promising way to put the data in the perspective of multiple value, adhere to the position of interest balance and risk prevention, and construct the data ownership theory of dynamic balance. The scenario theory coincides with this idea. Therefore, it is a reliable and effective way to reconstruct the data ownership theory under the guidance of the scenario theory, and to build a multiple dynamic governance system with soft law, public law and private law cooperating and complementing each other.
    Information Security Vulnerability Knowledge Base Based on Ontology
    2020, 6(10):  0-0. 
    Asbtract ( )   PDF (1510KB) ( )  
    Related Articles | Metrics
    The purpose of this paper is to study the application of ontology in the construction of knowledge base in the field of information security vulnerabilities. The classification system of information security vulnerability ontology knowledge base is established. The object attribute and data attribute of subclass is defined and the representation method of vulnerability instance is pointed out. Protégé, Jena and Java platform are used to realize the system prototype. Compared with traditional retrieval, ontology based semantic retrieval method can significantly improve recall rate while maintaining accuracy. Using ontology to build information security vulnerability knowledge base is more conducive to mining the internal relationship of vulnerability knowledge elements and providing users with more efficient knowledge services.
    Research on the Practice of Cyber Threat Intelligence Sharing in the United States
    2020, 6(10):  0-0. 
    Asbtract ( )   PDF (803KB) ( )  
    Related Articles | Metrics
    Cyber threat intelligence sharing is an important practice for the United States to maintain its military superiority and dominance in cyberspace. In order to deal with complex and unpredictable cyber threats, the United States has built a relatively perfect cyber threat intelligence sharing system, and achieved significant practical results. The paper analyzes the strategic position, strategy and goal of threat intelligence sharing in the United States, expounds the mechanism and legal construction of cyber threat intelligence, and finally discusses the practical measures of cyber threat information sharing, which has practical guiding significance to the construction of Cyberspace Security in China.
    The Rapid Development of Digital Economy More Need the Escort of Cyber Security
    2020, 6(10):  0-0. 
    Asbtract ( )   PDF (397KB) ( )  
    Related Articles | Metrics
    The Legislation of Data Classification is of Great Significance in Practical Guidance
    2020, 6(10):  0-0. 
    Asbtract ( )   PDF (1236KB) ( )  
    Related Articles | Metrics
    Defend the Country Against the Epidemic: New Emphasis of National Strategy of Cyber Security All over the World
    2020, 6(10):  0-0. 
    Asbtract ( )   PDF (724KB) ( )  
    Related Articles | Metrics